Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-99 | Improper Control of Resource Identifiers ('Resource Injection') The software receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. | 0 | 2 | 1 | 1 | 4 | |
CWE-707 | Improper Enforcement of Message or Data Structure The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain security properties are met before being read from an upstream component or sent to a downstream component. | 0 | 1 | 3 | 0 | 4 | |
CWE-201 | Information Exposure Through Sent Data The code transmits data to another actor, but the data contains sensitive information that should not be accessible to the actor that is receiving the data. | 0 | 4 | 0 | 0 | 4 | |
CWE-256 | Unprotected Storage of Credentials Storing a password in plaintext may result in a system compromise. | 0 | 4 | 0 | 0 | 4 | |
CWE-250 | Execution with Unnecessary Privileges The software performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. | 1 | 1 | 2 | 0 | 4 | |
CWE-204 | Response Discrepancy Information Exposure The product provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere. | 0 | 4 | 0 | 0 | 4 | |
CWE-321 | Use of Hard-coded Cryptographic Key The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered. | 0 | 3 | 1 | 0 | 4 | |
CWE-451 | User Interface (UI) Misrepresentation of Critical Information The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks. | 0 | 4 | 0 | 0 | 4 | |
CWE-184 | Incomplete Blacklist The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete, leading to resultant weaknesses. | 0 | 1 | 2 | 0 | 3 | |
CWE-18 | Source Code Weaknesses in this category are typically found within source code. | 1 | 0 | 1 | 1 | 3 |