All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-293: Using Referer Field for Authentication
Learn about CWE-293 (Using Referer Field for Authentication), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-294: Authentication Bypass by Capture-replay
Learn about CWE-294 (Authentication Bypass by Capture-replay), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-295: Improper Certificate Validation
Learn about CWE-295 (Improper Certificate Validation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-296: Improper Following of a Certificate's Chain of Trust
Learn about CWE-296 (Improper Following of a Certificate's Chain of Trust), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-297: Improper Validation of Certificate with Host Mismatch
Learn about CWE-297 (Improper Validation of Certificate with Host Mismatch), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-298: Improper Validation of Certificate Expiration
Learn about CWE-298 (Improper Validation of Certificate Expiration), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-299: Improper Check for Certificate Revocation
Learn about CWE-299 (Improper Check for Certificate Revocation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-30: Path Traversal: '\dir\..\filename'
Learn about CWE-30 (Path Traversal: '\dir\..\filename'), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-300: Channel Accessible by Non-Endpoint
Learn about CWE-300 (Channel Accessible by Non-Endpoint), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-301: Reflection Attack in an Authentication Protocol
Learn about CWE-301 (Reflection Attack in an Authentication Protocol), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-302: Authentication Bypass by Assumed-Immutable Data
Learn about CWE-302 (Authentication Bypass by Assumed-Immutable Data), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified