All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-795: Only Filtering Special Elements at a Specified Location
Learn about CWE-795 (Only Filtering Special Elements at a Specified Location), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-796: Only Filtering Special Elements Relative to a Marker
Learn about CWE-796 (Only Filtering Special Elements Relative to a Marker), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-797: Only Filtering Special Elements at an Absolute Position
Learn about CWE-797 (Only Filtering Special Elements at an Absolute Position), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-798: Use of Hard-coded Credentials
Learn about CWE-798 (Use of Hard-coded Credentials), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-799: Improper Control of Interaction Frequency
Learn about CWE-799 (Improper Control of Interaction Frequency), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-8: J2EE Misconfiguration: Entity Bean Declared Remote
Learn about CWE-8 (J2EE Misconfiguration: Entity Bean Declared Remote), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Learn about CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-804: Guessable CAPTCHA
Learn about CWE-804 (Guessable CAPTCHA), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-805: Buffer Access with Incorrect Length Value
Learn about CWE-805 (Buffer Access with Incorrect Length Value), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-806: Buffer Access Using Size of Source Buffer
Learn about CWE-806 (Buffer Access Using Size of Source Buffer), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-807: Reliance on Untrusted Inputs in a Security Decision
Learn about CWE-807 (Reliance on Untrusted Inputs in a Security Decision), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified