All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-563: Assignment to Variable without Use
Learn about CWE-563 (Assignment to Variable without Use), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-564: SQL Injection: Hibernate
Learn about CWE-564 (SQL Injection: Hibernate), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-565: Reliance on Cookies without Validation and Integrity Checking
Learn about CWE-565 (Reliance on Cookies without Validation and Integrity Checking), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-566: Authorization Bypass Through User-Controlled SQL Primary Key
Learn about CWE-566 (Authorization Bypass Through User-Controlled SQL Primary Key), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-567: Unsynchronized Access to Shared Data in a Multithreaded Context
Learn about CWE-567 (Unsynchronized Access to Shared Data in a Multithreaded Context), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-568: finalize() Method Without super.finalize()
Learn about CWE-568 (finalize() Method Without super.finalize()), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-57: Path Equivalence: 'fakedir/../realdir/filename'
Learn about CWE-57 (Path Equivalence: 'fakedir/../realdir/filename'), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-570: Expression is Always False
Learn about CWE-570 (Expression is Always False), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-571: Expression is Always True
Learn about CWE-571 (Expression is Always True), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-572: Call to Thread run() instead of start()
Learn about CWE-572 (Call to Thread run() instead of start()), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-573: Improper Following of Specification by Caller
Learn about CWE-573 (Improper Following of Specification by Caller), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified