Download
| Alert*
DEPRECATED: Often Misused: Path Manipulation
Description This entry has been deprecated because of name confusion and an accidental combination of multiple weaknesses. Most of its content has been transferred to CWE-785. Applicable PlatformsNone Common ConsequencesNone Detection MethodsNone Potential MitigationsNone Demonstrative ExamplesNone White Box Definitions None Black Box Definitions None Taxynomy MappingsNone References:None |