CWE-29 |
Path Traversal: '\..\filename' |
|
|
CWE-289 |
Authentication Bypass by Alternate Name |
|
|
CWE-288 |
Authentication Bypass Using an Alternate Path or Channel |
|
|
CWE-287 |
Improper Authentication |
|
|
CWE-286 |
Incorrect User Management |
|
|
CWE-285 |
Improper Authorization |
|
|
CWE-284 |
Improper Access Control |
|
|
CWE-283 |
Unverified Ownership |
|
|
CWE-282 |
Improper Ownership Management |
|
|
CWE-281 |
Improper Preservation of Permissions |
|
|
CWE-280 |
Improper Handling of Insufficient Permissions or Privileges |
|
|
CWE-28 |
Path Traversal: '..\filedir' |
|
|
CWE-279 |
Incorrect Execution-Assigned Permissions |
|
|
CWE-278 |
Insecure Preserved Inherited Permissions |
|
|
CWE-277 |
Insecure Inherited Permissions |
|
|
CWE-276 |
Incorrect Default Permissions |
|
|
CWE-275 |
Permission Issues |
|
|
CWE-274 |
Improper Handling of Insufficient Privileges |
|
|
CWE-273 |
Improper Check for Dropped Privileges |
|
|
CWE-272 |
Least Privilege Violation |
|
|