CWE-361 |
7PK - Time and State |
|
|
CWE-360 |
Trust of System Event Data |
|
|
CWE-36 |
Absolute Path Traversal |
|
|
CWE-359 |
Exposure of Private Personal Information to an Unauthorized Actor |
|
|
CWE-358 |
Improperly Implemented Security Check for Standard |
|
|
CWE-357 |
Insufficient UI Warning of Dangerous Operations |
|
|
CWE-356 |
Product UI does not Warn User of Unsafe Actions |
|
|
CWE-355 |
User Interface Security Issues |
|
|
CWE-354 |
Improper Validation of Integrity Check Value |
|
|
CWE-353 |
Missing Support for Integrity Check |
|
|
CWE-352 |
Cross-Site Request Forgery (CSRF) |
|
|
CWE-351 |
Insufficient Type Distinction |
|
|
CWE-350 |
Reliance on Reverse DNS Resolution for a Security-Critical Action |
|
|
CWE-35 |
Path Traversal: '.../...//' |
|
|
CWE-349 |
Acceptance of Extraneous Untrusted Data With Trusted Data |
|
|
CWE-348 |
Use of Less Trusted Source |
|
|
CWE-347 |
Improper Verification of Cryptographic Signature |
|
|
CWE-346 |
Origin Validation Error |
|
|
CWE-345 |
Insufficient Verification of Data Authenticity |
|
|
CWE-344 |
Use of Invariant Value in Dynamically Changing Context |
|
|