All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Learn about CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-749: Exposed Dangerous Method or Function
Learn about CWE-749 (Exposed Dangerous Method or Function), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
Learn about CWE-75 (Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-754: Improper Check for Unusual or Exceptional Conditions
Learn about CWE-754 (Improper Check for Unusual or Exceptional Conditions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-755: Improper Handling of Exceptional Conditions
Learn about CWE-755 (Improper Handling of Exceptional Conditions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-756: Missing Custom Error Page
Learn about CWE-756 (Missing Custom Error Page), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
Learn about CWE-757 (Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-758: Reliance on Undefined, Unspecified, or Implementation-Defined Behavior
Learn about CWE-758 (Reliance on Undefined, Unspecified, or Implementation-Defined Behavior), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-759: Use of a One-Way Hash without a Salt
Learn about CWE-759 (Use of a One-Way Hash without a Salt), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-76: Improper Neutralization of Equivalent Special Elements
Learn about CWE-76 (Improper Neutralization of Equivalent Special Elements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-760: Use of a One-Way Hash with a Predictable Salt
Learn about CWE-760 (Use of a One-Way Hash with a Predictable Salt), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-761: Free of Pointer not at Start of Buffer
Learn about CWE-761 (Free of Pointer not at Start of Buffer), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified