All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-638: Not Using Complete Mediation
Learn about CWE-638 (Not Using Complete Mediation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-639: Authorization Bypass Through User-Controlled Key
Learn about CWE-639 (Authorization Bypass Through User-Controlled Key), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-64: Windows Shortcut Following (.LNK)
Learn about CWE-64 (Windows Shortcut Following (.LNK)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-640: Weak Password Recovery Mechanism for Forgotten Password
Learn about CWE-640 (Weak Password Recovery Mechanism for Forgotten Password), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-641: Improper Restriction of Names for Files and Other Resources
Learn about CWE-641 (Improper Restriction of Names for Files and Other Resources), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-642: External Control of Critical State Data
Learn about CWE-642 (External Control of Critical State Data), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-643: Improper Neutralization of Data within XPath Expressions ('XPath Injection')
Learn about CWE-643 (Improper Neutralization of Data within XPath Expressions ('XPath Injection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-644: Improper Neutralization of HTTP Headers for Scripting Syntax
Learn about CWE-644 (Improper Neutralization of HTTP Headers for Scripting Syntax), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-645: Overly Restrictive Account Lockout Mechanism
Learn about CWE-645 (Overly Restrictive Account Lockout Mechanism), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-646: Reliance on File Name or Extension of Externally-Supplied File
Learn about CWE-646 (Reliance on File Name or Extension of Externally-Supplied File), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-647: Use of Non-Canonical URL Paths for Authorization Decisions
Learn about CWE-647 (Use of Non-Canonical URL Paths for Authorization Decisions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-648: Incorrect Use of Privileged APIs
Learn about CWE-648 (Incorrect Use of Privileged APIs), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified