Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-233 | Improper Handling of Parameters The software does not properly handle when the expected number of parameters, fields, or arguments is not provided in input, or if those parameters are undefined. | 0 | 1 | 0 | 0 | 1 | |
CWE-334 | Small Space of Random Values The number of possible random values is smaller than needed by the product, making it more susceptible to brute force attacks. | 0 | 1 | 0 | 0 | 1 | |
CWE-822 | Untrusted Pointer Dereference The program obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer. | 0 | 1 | 0 | 0 | 1 | |
CWE-351 | Insufficient Type Distinction The software does not properly distinguish between different types of elements in a way that leads to insecure behavior. | 0 | 1 | 0 | 0 | 1 | |
CWE-248 | Uncaught Exception An exception is thrown from a function, but it is not caught. | 0 | 1 | 0 | 0 | 1 | |
CWE-826 | Premature Release of Resource During Expected Lifetime The program releases a resource that is still intended to be used by the program itself or another actor. | 0 | 0 | 1 | 0 | 1 | |
CWE-402 | Transmission of Private Resources into a New Sphere ('Resource Leak') The software makes resources available to untrusted parties when those resources are only intended to be accessed by the software. | 0 | 1 | 0 | 0 | 1 | |
CWE-25 | Path Traversal: '/../filedir' The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize /../ sequences that can resolve to a location that is outside of that directory. | 0 | 0 | 1 | 0 | 1 | |
CWE-612 | Information Exposure Through Indexing of Private Data The product creates a search index of private or sensitive documents, but it does not properly limit index access to actors who are authorized to see the original information. | 0 | 1 | 0 | 0 | 1 | |
CWE-799 | Improper Control of Interaction Frequency The software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests. | 0 | 1 | 0 | 0 | 1 |