Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-184 | Incomplete Blacklist The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete, leading to resultant weaknesses. | 0 | 1 | 2 | 0 | 3 | |
CWE-18 | Source Code Weaknesses in this category are typically found within source code. | 1 | 0 | 1 | 1 | 3 | |
CWE-1187 | DEPRECATED: Use of Uninitialized Resource This entry has been deprecated because it was a duplicate of CWE-908. All content has been transferred to CWE-908. | 0 | 2 | 0 | 1 | 3 | |
CWE-920 | Improper Restriction of Power Consumption The software operates in an environment in which power is a limited resource that cannot be automatically replenished, but the software does not properly restrict the amount of power that its operation consumes. | 0 | 2 | 1 | 0 | 3 | |
CWE-707 | Improper Enforcement of Message or Data Structure The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain security properties are met before being read from an upstream component or sent to a downstream component. | 0 | 0 | 3 | 0 | 3 | |
CWE-321 | Use of Hard-coded Cryptographic Key The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered. | 0 | 2 | 1 | 0 | 3 | |
CWE-943 | Improper Neutralization of Special Elements in Data Query Logic The application generates a query intended to access or manipulate data in a data store such as a database, but it does not neutralize or incorrectly neutralizes special elements that can modify the intended logic of the query. | 0 | 1 | 2 | 0 | 3 | |
CWE-789 | Uncontrolled Memory Allocation The product allocates memory based on an untrusted size value, but it does not validate or incorrectly validates the size, allowing arbitrary amounts of memory to be allocated. | 0 | 3 | 0 | 0 | 3 | |
CWE-256 | Unprotected Storage of Credentials Storing a password in plaintext may result in a system compromise. | 0 | 3 | 0 | 0 | 3 | |
CWE-250 | Execution with Unnecessary Privileges The software performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. | 0 | 0 | 3 | 0 | 3 |