Page(s) : 1 ... 16 17 18 19 20 21 22 23 24 25 [26] 27 28 29 30 31 32 33 34 35 36 ... | Result(s) : 810 |
CWE ID | CWE Name |
---|---|
CWE-501 | Trust Boundary Violation |
CWE-502 | Deserialization of Untrusted Data |
CWE-503 | Byte/Object Code |
CWE-504 | Motivation/Intent |
CWE-505 | Intentionally Introduced Weakness |
CWE-506 | Embedded Malicious Code |
CWE-507 | Trojan Horse |
CWE-508 | Non-Replicating Malicious Code |
CWE-509 | Replicating Malicious Code (Virus or Worm) |
CWE-510 | Trapdoor |
CWE-511 | Logic/Time Bomb |
CWE-512 | Spyware |
CWE-513 | Intentionally Introduced Nonmalicious Weakness |
CWE-514 | Covert Channel |
CWE-515 | Covert Storage Channel |
CWE-516 | DEPRECATED (Duplicate): Covert Timing Channel |
CWE-517 | Other Intentional, Nonmalicious Weakness |
CWE-518 | Inadvertently Introduced Weakness |
CWE-519 | .NET Environment Issues |
CWE-520 | .NET Misconfiguration: Use of Impersonation |
Page(s) : 1 ... 16 17 18 19 20 21 22 23 24 25 [26] 27 28 29 30 31 32 33 34 35 36 ... | Result(s) : 810 |