All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-830: Inclusion of Web Functionality from an Untrusted Source
Learn about CWE-830 (Inclusion of Web Functionality from an Untrusted Source), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-831: Signal Handler Function Associated with Multiple Signals
Learn about CWE-831 (Signal Handler Function Associated with Multiple Signals), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-832: Unlock of a Resource that is not Locked
Learn about CWE-832 (Unlock of a Resource that is not Locked), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-833: Deadlock
Learn about CWE-833 (Deadlock), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-834: Excessive Iteration
Learn about CWE-834 (Excessive Iteration), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
Learn about CWE-835 (Loop with Unreachable Exit Condition ('Infinite Loop')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-836: Use of Password Hash Instead of Password for Authentication
Learn about CWE-836 (Use of Password Hash Instead of Password for Authentication), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-837: Improper Enforcement of a Single, Unique Action
Learn about CWE-837 (Improper Enforcement of a Single, Unique Action), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-838: Inappropriate Encoding for Output Context
Learn about CWE-838 (Inappropriate Encoding for Output Context), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-839: Numeric Range Comparison Without Minimum Check
Learn about CWE-839 (Numeric Range Comparison Without Minimum Check), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-84: Improper Neutralization of Encoded URI Schemes in a Web Page
Learn about CWE-84 (Improper Neutralization of Encoded URI Schemes in a Web Page), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified