All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-270: Privilege Context Switching Error
Learn about CWE-270 (Privilege Context Switching Error), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-271: Privilege Dropping / Lowering Errors
Learn about CWE-271 (Privilege Dropping / Lowering Errors), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-272: Least Privilege Violation
Learn about CWE-272 (Least Privilege Violation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-273: Improper Check for Dropped Privileges
Learn about CWE-273 (Improper Check for Dropped Privileges), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-274: Improper Handling of Insufficient Privileges
Learn about CWE-274 (Improper Handling of Insufficient Privileges), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-276: Incorrect Default Permissions
Learn about CWE-276 (Incorrect Default Permissions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-277: Insecure Inherited Permissions
Learn about CWE-277 (Insecure Inherited Permissions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-278: Insecure Preserved Inherited Permissions
Learn about CWE-278 (Insecure Preserved Inherited Permissions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-279: Incorrect Execution-Assigned Permissions
Learn about CWE-279 (Incorrect Execution-Assigned Permissions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-28: Path Traversal: '..iledir'
Learn about CWE-28 (Path Traversal: '..iledir'), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-280: Improper Handling of Insufficient Permissions or Privileges
Learn about CWE-280 (Improper Handling of Insufficient Permissions or Privileges ), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified