Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. | 17 | 16800 | 191 | 198 | 17206 | |
CWE-787 | Out-of-bounds Write The software writes data past the end, or before the beginning, of the intended buffer. | 18 | 1702 | 5392 | 2083 | 9195 | |
CWE-89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. | 11 | 392 | 2392 | 3250 | 6045 | |
CWE-20 | Improper Input Validation The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. | 88 | 1915 | 2452 | 620 | 5075 | |
CWE-119 | Improper Restriction of Operations within the Bounds of a Memory Buffer The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. | 25 | 734 | 3136 | 1131 | 5026 | |
CWE-125 | Out-of-bounds Read The software reads data past the end, or before the beginning, of the intended buffer. | 114 | 2236 | 1984 | 513 | 4847 | |
CWE-200 | Information Exposure The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. | 278 | 2600 | 1009 | 132 | 4019 | |
CWE-416 | Use After Free Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. | 21 | 614 | 2490 | 521 | 3646 | |
CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. | 40 | 1142 | 1732 | 628 | 3542 | |
CWE-352 | Cross-Site Request Forgery (CSRF) The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. | 23 | 1076 | 2147 | 18 | 3264 |