Categories

CWE NAME LAST 12M LOW MEDIUM HIGH CRITICAL TOTAL VULNS
CWE-1220 Insufficient Granularity of Access Control
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
0 2 0 0 2
CWE-912 Hidden Functionality
The software contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the software's users or administrators.
0 0 1 1 2
CWE-1287 Improper Validation of Specified Type of Input
The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.
0 0 1 1 2
CWE-317 Cleartext Storage of Sensitive Information in GUI
The application stores sensitive information in cleartext within the GUI.
0 2 0 0 2
CWE-201 Information Exposure Through Sent Data
The code transmits data to another actor, but the data contains sensitive information that should not be accessible to the actor that is receiving the data.
0 2 0 0 2
CWE-73 External Control of File Name or Path
The software allows user input to control or influence paths or file names that are used in filesystem operations.
0 1 1 0 2
CWE-117 Improper Output Neutralization for Logs
The software does not neutralize or incorrectly neutralizes output that is written to logs.
0 1 1 0 2
CWE-775 Missing Release of File Descriptor or Handle after Effective Lifetime
The software does not release a file descriptor or handle after its effective lifetime has ended, i.e., after the file descriptor/handle is no longer needed.
0 0 1 0 1
CWE-471 Modification of Assumed-Immutable Data (MAID)
The software does not properly protect an assumed-immutable element from being modified by an attacker.
0 0 1 0 1
CWE-774 Allocation of File Descriptors or Handles Without Limits or Throttling
The software allocates file descriptors or handles on behalf of an actor without imposing any restrictions on how many descriptors can be allocated, in violation of the intended security policy for that actor.
0 0 1 0 1