Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-672 | Operation on a Resource after Expiration or Release The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. | 1 | 17 | 15 | 4 | 37 | |
CWE-693 | Protection Mechanism Failure The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. | 1 | 19 | 12 | 4 | 36 | |
CWE-288 | Authentication Bypass Using an Alternate Path or Channel A product requires authentication, but the product has an alternate path or channel that does not require authentication. | 1 | 3 | 5 | 27 | 36 | |
CWE-266 | Incorrect Privilege Assignment A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. | 1 | 22 | 5 | 7 | 35 | |
CWE-388 | 7PK - Errors This category represents one of the phyla in the Seven Pernicious Kingdoms vulnerability classification. It includes weaknesses that occur when an application does not properly handle errors that occur during processing. According to the authors of the Seven Pernicious Kingdoms, "Errors and error handling represent a class of API. Errors related to error handling are so common that they deserve a special kingdom of their own. As with 'API Abuse,' there are two ways to introduce an error-related security vulnerability: the most common one is handling errors poorly (or not at all). The second is producing errors that either give out too much information (to possible attackers) or are difficult to handle." | 0 | 11 | 11 | 12 | 34 | |
CWE-320 | Key Management Errors Weaknesses in this category are related to errors in the management of cryptographic keys. | 1 | 12 | 15 | 6 | 34 | |
CWE-121 | Stack-based Buffer Overflow A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). | 1 | 4 | 18 | 8 | 31 | |
CWE-93 | Improper Neutralization of CRLF Sequences ('CRLF Injection') The software uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs. | 0 | 24 | 6 | 0 | 30 | |
CWE-335 | Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) The software uses a Pseudo-Random Number Generator (PRNG) that does not correctly manage seeds. | 0 | 3 | 13 | 8 | 24 | |
CWE-470 | Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') The application uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code. | 0 | 3 | 14 | 7 | 24 |