All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-270: Privilege Context Switching Error
Learn about CWE-270 (Privilege Context Switching Error), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-271: Privilege Dropping / Lowering Errors
Learn about CWE-271 (Privilege Dropping / Lowering Errors), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-272: Least Privilege Violation
Learn about CWE-272 (Least Privilege Violation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-273: Improper Check for Dropped Privileges
Learn about CWE-273 (Improper Check for Dropped Privileges), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-274: Improper Handling of Insufficient Privileges
Learn about CWE-274 (Improper Handling of Insufficient Privileges), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-276: Incorrect Default Permissions
Learn about CWE-276 (Incorrect Default Permissions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-277: Insecure Inherited Permissions
Learn about CWE-277 (Insecure Inherited Permissions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-278: Insecure Preserved Inherited Permissions
Learn about CWE-278 (Insecure Preserved Inherited Permissions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-279: Incorrect Execution-Assigned Permissions
Learn about CWE-279 (Incorrect Execution-Assigned Permissions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-28: Path Traversal: '.. iledir'
Learn about CWE-28 (Path Traversal: '.. iledir'), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-280: Improper Handling of Insufficient Permissions or Privileges
Learn about CWE-280 (Improper Handling of Insufficient Permissions or Privileges ), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-281: Improper Preservation of Permissions
Learn about CWE-281 (Improper Preservation of Permissions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified