Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-75 | Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) The software does not adequately filter user-controlled input for special elements with control implications. | 0 | 1 | 0 | 0 | 1 | |
CWE-549 | Missing Password Field Masking The software does not mask passwords during entry, increasing the potential for attackers to observe and capture passwords. | 0 | 1 | 0 | 0 | 1 | |
CWE-377 | Insecure Temporary File Creating and using insecure temporary files can leave application and system data vulnerable to attack. | 1 | 0 | 0 | 0 | 1 | |
CWE-1108 | Excessive Reliance on Global Variables The code is structured in a way that relies too much on using or setting global variables throughout various points in the code, instead of preserving the associated information in a narrower, more local context. | 0 | 1 | 0 | 0 | 1 | |
CWE-270 | Privilege Context Switching Error The software does not properly manage privileges while it is switching between different contexts that have different privileges or spheres of control. | 0 | 0 | 1 | 0 | 1 | |
CWE-527 | Exposure of CVS Repository to an Unauthorized Control Sphere The product stores a CVS, git, or other repository in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors. | 0 | 1 | 0 | 0 | 1 | |
CWE-391 | Unchecked Error Condition [PLANNED FOR DEPRECATION. SEE MAINTENANCE NOTES.] Ignoring exceptions and other error conditions may allow an attacker to induce unexpected behavior unnoticed. | 0 | 1 | 0 | 0 | 1 | |
CWE-233 | Improper Handling of Parameters The software does not properly handle when the expected number of parameters, fields, or arguments is not provided in input, or if those parameters are undefined. | 0 | 1 | 0 | 0 | 1 | |
CWE-334 | Small Space of Random Values The number of possible random values is smaller than needed by the product, making it more susceptible to brute force attacks. | 0 | 1 | 0 | 0 | 1 | |
CWE-126 | Buffer Over-read The software reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. | 0 | 1 | 0 | 0 | 1 |