Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-126 | Buffer Over-read The software reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. | 0 | 6 | 9 | 0 | 15 | |
CWE-118 | Incorrect Access of Indexable Resource ('Range Error') The software does not restrict or incorrectly restricts operations within the boundaries of a resource that is accessed using an index or pointer, such as memory or files. | 0 | 3 | 2 | 8 | 13 | |
CWE-73 | External Control of File Name or Path The software allows user input to control or influence paths or file names that are used in filesystem operations. | 2 | 6 | 4 | 1 | 13 | |
CWE-90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') The software constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component. | 1 | 3 | 4 | 4 | 12 | |
CWE-185 | Incorrect Regular Expression The software specifies a regular expression in a way that causes data to be improperly matched or compared. | 0 | 4 | 6 | 2 | 12 | |
CWE-497 | Exposure of System Data to an Unauthorized Control Sphere The application does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the application does. | 1 | 9 | 2 | 0 | 12 | |
CWE-23 | Relative Path Traversal The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as .. that can resolve to a location that is outside of that directory. | 0 | 5 | 5 | 1 | 11 | |
CWE-15 | External Control of System or Configuration Setting One or more system settings or configuration elements can be externally controlled by a user. | 0 | 0 | 1 | 9 | 10 | |
CWE-99 | Improper Control of Resource Identifiers ('Resource Injection') The software receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. | 0 | 7 | 2 | 1 | 10 | |
CWE-172 | Encoding Error The software does not properly encode or decode the data, resulting in unexpected values. | 1 | 5 | 1 | 2 | 9 |