All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Learn about CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-749: Exposed Dangerous Method or Function
Learn about CWE-749 (Exposed Dangerous Method or Function), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
Learn about CWE-75 (Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-754: Improper Check for Unusual or Exceptional Conditions
Learn about CWE-754 (Improper Check for Unusual or Exceptional Conditions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-755: Improper Handling of Exceptional Conditions
Learn about CWE-755 (Improper Handling of Exceptional Conditions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-756: Missing Custom Error Page
Learn about CWE-756 (Missing Custom Error Page), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
Learn about CWE-757 (Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-758: Reliance on Undefined, Unspecified, or Implementation-Defined Behavior
Learn about CWE-758 (Reliance on Undefined, Unspecified, or Implementation-Defined Behavior), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-759: Use of a One-Way Hash without a Salt
Learn about CWE-759 (Use of a One-Way Hash without a Salt), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-76: Improper Neutralization of Equivalent Special Elements
Learn about CWE-76 (Improper Neutralization of Equivalent Special Elements), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-760: Use of a One-Way Hash with a Predictable Salt
Learn about CWE-760 (Use of a One-Way Hash with a Predictable Salt), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified