All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-920: Improper Restriction of Power Consumption
Learn about CWE-920 (Improper Restriction of Power Consumption), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-921: Storage of Sensitive Data in a Mechanism without Access Control
Learn about CWE-921 (Storage of Sensitive Data in a Mechanism without Access Control), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-922: Insecure Storage of Sensitive Information
Learn about CWE-922 (Insecure Storage of Sensitive Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-923: Improper Restriction of Communication Channel to Intended Endpoints
Learn about CWE-923 (Improper Restriction of Communication Channel to Intended Endpoints), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel
Learn about CWE-924 (Improper Enforcement of Message Integrity During Transmission in a Communication Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-925: Improper Verification of Intent by Broadcast Receiver
Learn about CWE-925 (Improper Verification of Intent by Broadcast Receiver), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-926: Improper Export of Android Application Components
Learn about CWE-926 (Improper Export of Android Application Components), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-927: Use of Implicit Intent for Sensitive Communication
Learn about CWE-927 (Use of Implicit Intent for Sensitive Communication), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')
Learn about CWE-93 (Improper Neutralization of CRLF Sequences ('CRLF Injection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-939: Improper Authorization in Handler for Custom URL Scheme
Learn about CWE-939 (Improper Authorization in Handler for Custom URL Scheme), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-94: Improper Control of Generation of Code ('Code Injection')
Learn about CWE-94 (Improper Control of Generation of Code ('Code Injection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-940: Improper Verification of Source of a Communication Channel
Learn about CWE-940 (Improper Verification of Source of a Communication Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified