All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-1085: Invokable Control Element with Excessive Volume of Commented-out Code
Learn about CWE-1085 (Invokable Control Element with Excessive Volume of Commented-out Code), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1086: Class with Excessive Number of Child Classes
Learn about CWE-1086 (Class with Excessive Number of Child Classes), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1087: Class with Virtual Method without a Virtual Destructor
Learn about CWE-1087 (Class with Virtual Method without a Virtual Destructor), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1088: Synchronous Access of Remote Resource without Timeout
Learn about CWE-1088 (Synchronous Access of Remote Resource without Timeout), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1089: Large Data Table with Excessive Number of Indices
Learn about CWE-1089 (Large Data Table with Excessive Number of Indices), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-109: Struts: Validator Turned Off
Learn about CWE-109 (Struts: Validator Turned Off), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1090: Method Containing Access of a Member Element from Another Class
Learn about CWE-1090 (Method Containing Access of a Member Element from Another Class), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1091: Use of Object without Invoking Destructor Method
Learn about CWE-1091 (Use of Object without Invoking Destructor Method), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1092: Use of Same Invokable Control Element in Multiple Architectural Layers
Learn about CWE-1092 (Use of Same Invokable Control Element in Multiple Architectural Layers), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1093: Excessively Complex Data Representation
Learn about CWE-1093 (Excessively Complex Data Representation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1094: Excessive Index Range Scan for a Data Resource
Learn about CWE-1094 (Excessive Index Range Scan for a Data Resource), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified