Update CWE list to 4.17
From the list from https://cwe.mitre.org/data/downloads.html
```
(echo -n "{\"examples\":["; cat cwec_v4.17.xml | grep Weakness\ ID | cut -d '"' -f 2,4 | sort -n | sed -e "s/\([0-9]*\)\"\(.*\)/\"CWE-\\1 \\2\",/" | sed -e "s/\\\\/\\\\\\\\/g" | head -c -2; echo "]}") > public/js/cwe-all.json
```
diff --git a/public/js/cwe-all.json b/public/js/cwe-all.json
index 9d3990d..7fc9cab 100644
--- a/public/js/cwe-all.json
+++ b/public/js/cwe-all.json
@@ -733,7 +733,7 @@
"CWE-1025 Comparison Using Wrong Factors",
"CWE-1037 Processor Optimization Removal or Modification of Security-critical Code",
"CWE-1038 Insecure Automated Optimizations",
-"CWE-1039 Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations",
+"CWE-1039 Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism",
"CWE-1041 Use of Redundant Code",
"CWE-1042 Static Member Data Element outside of a Singleton Class Element",
"CWE-1043 Data Element Aggregating an Excessively Large Number of Non-Primitive Elements",
@@ -961,4 +961,8 @@
"CWE-1421 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution",
"CWE-1422 Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution",
"CWE-1423 Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution",
-"CWE-1426 Improper Validation of Generative AI Output"]}
+"CWE-1426 Improper Validation of Generative AI Output",
+"CWE-1427 Improper Neutralization of Input Used for LLM Prompting",
+"CWE-1428 Reliance on HTTP instead of HTTPS",
+"CWE-1429 Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface",
+"CWE-1431 Driving Intermediate Cryptographic State/Results to Hardware Module Outputs"]}