All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-842: Placement of User into Incorrect Group
Learn about CWE-842 (Placement of User into Incorrect Group), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
Learn about CWE-843 (Access of Resource Using Incompatible Type ('Type Confusion')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-85: Doubled Character XSS Manipulations
Learn about CWE-85 (Doubled Character XSS Manipulations), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-86: Improper Neutralization of Invalid Characters in Identifiers in Web Pages
Learn about CWE-86 (Improper Neutralization of Invalid Characters in Identifiers in Web Pages), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-862: Missing Authorization
Learn about CWE-862 (Missing Authorization), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-863: Incorrect Authorization
Learn about CWE-863 (Incorrect Authorization), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-87: Improper Neutralization of Alternate XSS Syntax
Learn about CWE-87 (Improper Neutralization of Alternate XSS Syntax), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Learn about CWE-88 (Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Learn about CWE-89 (Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-9: J2EE Misconfiguration: Weak Access Permissions for EJB Methods
Learn about CWE-9 (J2EE Misconfiguration: Weak Access Permissions for EJB Methods), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
Learn about CWE-90 (Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified