All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-649: Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
Learn about CWE-649 (Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-65: Windows Hard Link
Learn about CWE-65 (Windows Hard Link), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-650: Trusting HTTP Permission Methods on the Server Side
Learn about CWE-650 (Trusting HTTP Permission Methods on the Server Side), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-651: Exposure of WSDL File Containing Sensitive Information
Learn about CWE-651 (Exposure of WSDL File Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-652: Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
Learn about CWE-652 (Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-653: Improper Isolation or Compartmentalization
Learn about CWE-653 (Improper Isolation or Compartmentalization), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-654: Reliance on a Single Factor in a Security Decision
Learn about CWE-654 (Reliance on a Single Factor in a Security Decision), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-655: Insufficient Psychological Acceptability
Learn about CWE-655 (Insufficient Psychological Acceptability), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-656: Reliance on Security Through Obscurity
Learn about CWE-656 (Reliance on Security Through Obscurity), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-657: Violation of Secure Design Principles
Learn about CWE-657 (Violation of Secure Design Principles), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-66: Improper Handling of File Names that Identify Virtual Resources
Learn about CWE-66 (Improper Handling of File Names that Identify Virtual Resources), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified