All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-784: Reliance on Cookies without Validation and Integrity Checking in a Security Decision
Learn about CWE-784 (Reliance on Cookies without Validation and Integrity Checking in a Security Decision), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-785: Use of Path Manipulation Function without Maximum-sized Buffer
Learn about CWE-785 (Use of Path Manipulation Function without Maximum-sized Buffer), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-786: Access of Memory Location Before Start of Buffer
Learn about CWE-786 (Access of Memory Location Before Start of Buffer), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-787: Out-of-bounds Write
Learn about CWE-787 (Out-of-bounds Write), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-788: Access of Memory Location After End of Buffer
Learn about CWE-788 (Access of Memory Location After End of Buffer), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-789: Memory Allocation with Excessive Size Value
Learn about CWE-789 (Memory Allocation with Excessive Size Value), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Learn about CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-790: Improper Filtering of Special Elements
Learn about CWE-790 (Improper Filtering of Special Elements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-791: Incomplete Filtering of Special Elements
Learn about CWE-791 (Incomplete Filtering of Special Elements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-792: Incomplete Filtering of One or More Instances of Special Elements
Learn about CWE-792 (Incomplete Filtering of One or More Instances of Special Elements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-793: Only Filtering One Instance of a Special Element
Learn about CWE-793 (Only Filtering One Instance of a Special Element), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-794: Incomplete Filtering of Multiple Instances of Special Elements
Learn about CWE-794 (Incomplete Filtering of Multiple Instances of Special Elements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified