CWE-813: OWASP Top Ten 2010 Category A4 - Insecure Direct Object References
ID
CWE-813
Status
Obsolete
Weaknesses in this category are related to the A4 category in the OWASP Top Ten 2010.
Relationships
View | Weakness | ||||||
---|---|---|---|---|---|---|---|
# ID | Name | # ID | Name | Abstraction | Structure | Status | |
CWE-809 | Weaknesses in OWASP Top Ten (2010) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | Base | Simple | Stable | |
CWE-809 | Weaknesses in OWASP Top Ten (2010) | CWE-434 | Unrestricted Upload of File with Dangerous Type | Base | Simple | Draft | |
CWE-809 | Weaknesses in OWASP Top Ten (2010) | CWE-639 | Authorization Bypass Through User-Controlled Key | Base | Simple | Incomplete | |
CWE-809 | Weaknesses in OWASP Top Ten (2010) | CWE-829 | Inclusion of Functionality from Untrusted Control Sphere | Base | Simple | Incomplete | |
CWE-809 | Weaknesses in OWASP Top Ten (2010) | CWE-862 | Missing Authorization | Class | Simple | Incomplete | |
CWE-809 | Weaknesses in OWASP Top Ten (2010) | CWE-863 | Incorrect Authorization | Class | Simple | Incomplete | |
CWE-809 | Weaknesses in OWASP Top Ten (2010) | CWE-99 | Improper Control of Resource Identifiers ('Resource Injection') | Class | Simple | Draft |
Loading...