| CWE-29 |
Path Traversal: '\..\filename' |
|
|
| CWE-289 |
Authentication Bypass by Alternate Name |
|
|
| CWE-288 |
Authentication Bypass Using an Alternate Path or Channel |
|
|
| CWE-287 |
Improper Authentication |
|
|
| CWE-286 |
Incorrect User Management |
|
|
| CWE-285 |
Improper Authorization |
|
|
| CWE-284 |
Improper Access Control |
|
|
| CWE-283 |
Unverified Ownership |
|
|
| CWE-282 |
Improper Ownership Management |
|
|
| CWE-281 |
Improper Preservation of Permissions |
|
|
| CWE-280 |
Improper Handling of Insufficient Permissions or Privileges |
|
|
| CWE-28 |
Path Traversal: '..\filedir' |
|
|
| CWE-279 |
Incorrect Execution-Assigned Permissions |
|
|
| CWE-278 |
Insecure Preserved Inherited Permissions |
|
|
| CWE-277 |
Insecure Inherited Permissions |
|
|
| CWE-276 |
Incorrect Default Permissions |
|
|
| CWE-275 |
Permission Issues |
|
|
| CWE-274 |
Improper Handling of Insufficient Privileges |
|
|
| CWE-273 |
Improper Check for Dropped Privileges |
|
|
| CWE-272 |
Least Privilege Violation |
|
|