All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-258: Empty Password in Configuration File
Learn about CWE-258 (Empty Password in Configuration File), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-259: Use of Hard-coded Password
Learn about CWE-259 (Use of Hard-coded Password), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-26: Path Traversal: '/dir/../filename'
Learn about CWE-26 (Path Traversal: '/dir/../filename'), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-260: Password in Configuration File
Learn about CWE-260 (Password in Configuration File), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-261: Weak Encoding for Password
Learn about CWE-261 (Weak Encoding for Password), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-262: Not Using Password Aging
Learn about CWE-262 (Not Using Password Aging), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-263: Password Aging with Long Expiration
Learn about CWE-263 (Password Aging with Long Expiration), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-266: Incorrect Privilege Assignment
Learn about CWE-266 (Incorrect Privilege Assignment), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-267: Privilege Defined With Unsafe Actions
Learn about CWE-267 (Privilege Defined With Unsafe Actions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-268: Privilege Chaining
Learn about CWE-268 (Privilege Chaining), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-269: Improper Privilege Management
Learn about CWE-269 (Improper Privilege Management), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified