# CWE Index Browse 94 vulnerability types with 347 detection rules. Learn about security weaknesses, see code examples, and find remediation guidance. - Total CWEs: 94 - Detection rules: 347 ## Top CWEs - **CWE-200**: Information Exposure (14 rules, 4%) - **CWE-20**: Improper Input Validation (13 rules, 4%) - **CWE-798**: Hardcoded Credentials (11 rules, 3%) - **CWE-94**: Code Injection (10 rules, 3%) - **CWE-250**: CWE-250 (10 rules, 3%) - **CWE-942**: CWE-942 (9 rules, 3%) - **CWE-400**: Resource Exhaustion (8 rules, 2%) - **CWE-639**: Authorization Bypass via User Key (8 rules, 2%) - **CWE-693**: Protection Mechanism Failure (8 rules, 2%) - **CWE-89**: SQL Injection (7 rules, 2%) ## Categories ### 0 ### 1 ### 2 ### 3 ### 4 ### 5 ### 6 ### 7 ### 8 ### 9 ### 10 ### 11 ### 12 ### 13 ### 14 ### 15 ### 16 ### 17 ### 18 ### 19 ### 20 ### 21