Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-197 | Numeric Truncation Error Truncation errors occur when a primitive is cast to a primitive of a smaller size and data is lost in the conversion. | 0 | 1 | 0 | 0 | 1 | |
CWE-202 | Exposure of Sensitive Data Through Data Queries When trying to keep information confidential, an attacker can often infer some of the information by using statistics. | 1 | 0 | 0 | 0 | 1 | |
CWE-378 | Creation of Temporary File With Insecure Permissions Opening temporary files without appropriate measures or controls can leave the file, its contents and any function that it impacts vulnerable to attack. | 0 | 1 | 0 | 0 | 1 | |
CWE-420 | Unprotected Alternate Channel The software protects a primary channel, but it does not use the same level of protection for an alternate channel. | 0 | 0 | 0 | 1 | 1 | |
CWE-413 | Improper Resource Locking The software does not lock or does not correctly lock a resource when the software must have exclusive access to the resource. | 0 | 0 | 1 | 0 | 1 | |
CWE-939 | Improper Authorization in Handler for Custom URL Scheme The software uses a handler for a custom URL scheme, but it does not properly restrict which actors can invoke the handler using the scheme. | 0 | 0 | 1 | 0 | 1 | |
CWE-219 | Sensitive Data Under Web Root The application stores sensitive data under the web document root with insufficient access control, which might make it accessible to untrusted parties. | 0 | 0 | 1 | 0 | 1 | |
CWE-324 | Use of a Key Past its Expiration Date The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key. | 0 | 1 | 0 | 0 | 1 | |
CWE-81 | Improper Neutralization of Script in an Error Message Web Page The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters that could be interpreted as web-scripting elements when they are sent to an error page. | 0 | 1 | 0 | 0 | 1 | |
CWE-650 | Trusting HTTP Permission Methods on the Server Side The server contains a protection mechanism that assumes that any URI that is accessed using HTTP GET will not cause a state change to the associated resource. This might allow attackers to bypass intended access restrictions and conduct resource modification and deletion attacks, since some applications allow GET to modify state. | 0 | 1 | 0 | 0 | 1 |