Categories

CWE NAME LAST 12M LOW MEDIUM HIGH CRITICAL TOTAL VULNS
CWE-282 Improper Ownership Management
The software assigns the wrong ownership, or does not properly verify the ownership, of an object or resource.
0 0 2 0 2
CWE-61 UNIX Symbolic Link (Symlink) Following
The software, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the software to operate on unauthorized files.
0 2 0 0 2
CWE-317 Cleartext Storage of Sensitive Information in GUI
The application stores sensitive information in cleartext within the GUI.
0 2 0 0 2
CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
The Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the user agent to send those cookies in plaintext over an HTTP session.
0 2 0 0 2
CWE-923 Improper Restriction of Communication Channel to Intended Endpoints
The software establishes a communication channel to (or from) an endpoint for privileged or protected operations, but it does not properly ensure that it is communicating with the correct endpoint.
0 1 1 0 2
CWE-759 Use of a One-Way Hash without a Salt
The software uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input.
0 2 0 0 2
CWE-248 Uncaught Exception
An exception is thrown from a function, but it is not caught.
0 2 0 0 2
CWE-942 Overly Permissive Cross-domain Whitelist
The software uses a cross-domain policy file that includes domains that should not be trusted.
1 1 0 0 2
CWE-501 Trust Boundary Violation
The product mixes trusted and untrusted data in the same data structure or structured message.
0 1 1 0 2
CWE-799 Improper Control of Interaction Frequency
The software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests.
1 1 0 0 2