All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-830: Inclusion of Web Functionality from an Untrusted Source
Learn about CWE-830 (Inclusion of Web Functionality from an Untrusted Source), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-831: Signal Handler Function Associated with Multiple Signals
Learn about CWE-831 (Signal Handler Function Associated with Multiple Signals), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-832: Unlock of a Resource that is not Locked
Learn about CWE-832 (Unlock of a Resource that is not Locked), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-833: Deadlock
Learn about CWE-833 (Deadlock), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-834: Excessive Iteration
Learn about CWE-834 (Excessive Iteration), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
Learn about CWE-835 (Loop with Unreachable Exit Condition ('Infinite Loop')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-836: Use of Password Hash Instead of Password for Authentication
Learn about CWE-836 (Use of Password Hash Instead of Password for Authentication), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-837: Improper Enforcement of a Single, Unique Action
Learn about CWE-837 (Improper Enforcement of a Single, Unique Action), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-838: Inappropriate Encoding for Output Context
Learn about CWE-838 (Inappropriate Encoding for Output Context), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-839: Numeric Range Comparison Without Minimum Check
Learn about CWE-839 (Numeric Range Comparison Without Minimum Check), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-84: Improper Neutralization of Encoded URI Schemes in a Web Page
Learn about CWE-84 (Improper Neutralization of Encoded URI Schemes in a Web Page), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-841: Improper Enforcement of Behavioral Workflow
Learn about CWE-841 (Improper Enforcement of Behavioral Workflow), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified