Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-75 | Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) The software does not adequately filter user-controlled input for special elements with control implications. | 0 | 1 | 0 | 0 | 1 | |
CWE-549 | Missing Password Field Masking The software does not mask passwords during entry, increasing the potential for attackers to observe and capture passwords. | 0 | 1 | 0 | 0 | 1 | |
CWE-377 | Insecure Temporary File Creating and using insecure temporary files can leave application and system data vulnerable to attack. | 1 | 0 | 0 | 0 | 1 | |
CWE-1108 | Excessive Reliance on Global Variables The code is structured in a way that relies too much on using or setting global variables throughout various points in the code, instead of preserving the associated information in a narrower, more local context. | 0 | 1 | 0 | 0 | 1 | |
CWE-95 | Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. eval). | 0 | 0 | 0 | 1 | 1 | |
CWE-230 | Improper Handling of Missing Values The software does not handle or incorrectly handles when a parameter, field, or argument name is specified, but the associated value is missing, i.e. it is empty, blank, or null. | 0 | 0 | 0 | 1 | 1 | |
CWE-270 | Privilege Context Switching Error The software does not properly manage privileges while it is switching between different contexts that have different privileges or spheres of control. | 0 | 0 | 1 | 0 | 1 | |
CWE-527 | Exposure of CVS Repository to an Unauthorized Control Sphere The product stores a CVS, git, or other repository in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors. | 0 | 1 | 0 | 0 | 1 | |
CWE-391 | Unchecked Error Condition [PLANNED FOR DEPRECATION. SEE MAINTENANCE NOTES.] Ignoring exceptions and other error conditions may allow an attacker to induce unexpected behavior unnoticed. | 0 | 1 | 0 | 0 | 1 | |
CWE-24 | Path Traversal: '../filedir' The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize ../ sequences that can resolve to a location that is outside of that directory. | 0 | 1 | 0 | 0 | 1 |