All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-282: Improper Ownership Management
Learn about CWE-282 (Improper Ownership Management), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-283: Unverified Ownership
Learn about CWE-283 (Unverified Ownership), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-284: Improper Access Control
Learn about CWE-284 (Improper Access Control), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-285: Improper Authorization
Learn about CWE-285 (Improper Authorization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-286: Incorrect User Management
Learn about CWE-286 (Incorrect User Management), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-287: Improper Authentication
Learn about CWE-287 (Improper Authentication), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-288: Authentication Bypass Using an Alternate Path or Channel
Learn about CWE-288 (Authentication Bypass Using an Alternate Path or Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-289: Authentication Bypass by Alternate Name
Learn about CWE-289 (Authentication Bypass by Alternate Name), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-29: Path Traversal: '\..\filename'
Learn about CWE-29 (Path Traversal: '\..\filename'), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-290: Authentication Bypass by Spoofing
Learn about CWE-290 (Authentication Bypass by Spoofing), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-291: Reliance on IP Address for Authentication
Learn about CWE-291 (Reliance on IP Address for Authentication), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-292: DEPRECATED: Trusting Self-reported DNS Name
Learn about CWE-292 (DEPRECATED: Trusting Self-reported DNS Name), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified