Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-348 | Use of Less Trusted Source The software has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack. | 0 | 1 | 0 | 0 | 1 | |
CWE-1288 | Improper Validation of Consistency within Input The product receives a complex input with multiple elements or fields that must be consistent with each other, but it does not validate or incorrectly validates that the input is actually consistent. | 0 | 0 | 1 | 0 | 1 | |
CWE-833 | Deadlock The software contains multiple threads or executable segments that are waiting for each other to release a necessary lock, resulting in deadlock. | 0 | 1 | 0 | 0 | 1 | |
CWE-703 | Improper Check or Handling of Exceptional Conditions The software does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the software. | 0 | 1 | 0 | 0 | 1 | |
CWE-75 | Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) The software does not adequately filter user-controlled input for special elements with control implications. | 0 | 1 | 0 | 0 | 1 | |
CWE-549 | Missing Password Field Masking The software does not mask passwords during entry, increasing the potential for attackers to observe and capture passwords. | 0 | 1 | 0 | 0 | 1 | |
CWE-377 | Insecure Temporary File Creating and using insecure temporary files can leave application and system data vulnerable to attack. | 1 | 0 | 0 | 0 | 1 | |
CWE-1108 | Excessive Reliance on Global Variables The code is structured in a way that relies too much on using or setting global variables throughout various points in the code, instead of preserving the associated information in a narrower, more local context. | 0 | 1 | 0 | 0 | 1 | |
CWE-270 | Privilege Context Switching Error The software does not properly manage privileges while it is switching between different contexts that have different privileges or spheres of control. | 0 | 0 | 1 | 0 | 1 | |
CWE-527 | Exposure of CVS Repository to an Unauthorized Control Sphere The product stores a CVS, git, or other repository in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors. | 0 | 1 | 0 | 0 | 1 |