All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-842: Placement of User into Incorrect Group
Learn about CWE-842 (Placement of User into Incorrect Group), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
Learn about CWE-843 (Access of Resource Using Incompatible Type ('Type Confusion')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-85: Doubled Character XSS Manipulations
Learn about CWE-85 (Doubled Character XSS Manipulations), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-86: Improper Neutralization of Invalid Characters in Identifiers in Web Pages
Learn about CWE-86 (Improper Neutralization of Invalid Characters in Identifiers in Web Pages), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-862: Missing Authorization
Learn about CWE-862 (Missing Authorization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-863: Incorrect Authorization
Learn about CWE-863 (Incorrect Authorization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-87: Improper Neutralization of Alternate XSS Syntax
Learn about CWE-87 (Improper Neutralization of Alternate XSS Syntax), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Learn about CWE-88 (Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Learn about CWE-89 (Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-9: J2EE Misconfiguration: Weak Access Permissions for EJB Methods
Learn about CWE-9 (J2EE Misconfiguration: Weak Access Permissions for EJB Methods), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
Learn about CWE-90 (Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-908: Use of Uninitialized Resource
Learn about CWE-908 (Use of Uninitialized Resource), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified