All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-784: Reliance on Cookies without Validation and Integrity Checking in a Security Decision
Learn about CWE-784 (Reliance on Cookies without Validation and Integrity Checking in a Security Decision), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-785: Use of Path Manipulation Function without Maximum-sized Buffer
Learn about CWE-785 (Use of Path Manipulation Function without Maximum-sized Buffer), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-786: Access of Memory Location Before Start of Buffer
Learn about CWE-786 (Access of Memory Location Before Start of Buffer), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-787: Out-of-bounds Write
Learn about CWE-787 (Out-of-bounds Write), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-788: Access of Memory Location After End of Buffer
Learn about CWE-788 (Access of Memory Location After End of Buffer), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-789: Memory Allocation with Excessive Size Value
Learn about CWE-789 (Memory Allocation with Excessive Size Value), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Learn about CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-790: Improper Filtering of Special Elements
Learn about CWE-790 (Improper Filtering of Special Elements), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-791: Incomplete Filtering of Special Elements
Learn about CWE-791 (Incomplete Filtering of Special Elements), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-792: Incomplete Filtering of One or More Instances of Special Elements
Learn about CWE-792 (Incomplete Filtering of One or More Instances of Special Elements), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-793: Only Filtering One Instance of a Special Element
Learn about CWE-793 (Only Filtering One Instance of a Special Element), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified