Categories

CWE NAME LAST 12M LOW MEDIUM HIGH CRITICAL TOTAL VULNS
CWE-391 Unchecked Error Condition
[PLANNED FOR DEPRECATION. SEE MAINTENANCE NOTES.] Ignoring exceptions and other error conditions may allow an attacker to induce unexpected behavior unnoticed.
0 1 0 0 1
CWE-233 Improper Handling of Parameters
The software does not properly handle when the expected number of parameters, fields, or arguments is not provided in input, or if those parameters are undefined.
0 1 0 0 1
CWE-286 Incorrect User Management
The software does not properly manage a user within its environment.
0 0 1 0 1
CWE-334 Small Space of Random Values
The number of possible random values is smaller than needed by the product, making it more susceptible to brute force attacks.
0 1 0 0 1
CWE-351 Insufficient Type Distinction
The software does not properly distinguish between different types of elements in a way that leads to insecure behavior.
0 1 0 0 1
CWE-826 Premature Release of Resource During Expected Lifetime
The program releases a resource that is still intended to be used by the program itself or another actor.
0 0 1 0 1
CWE-402 Transmission of Private Resources into a New Sphere ('Resource Leak')
The software makes resources available to untrusted parties when those resources are only intended to be accessed by the software.
0 1 0 0 1
CWE-789 Uncontrolled Memory Allocation
The product allocates memory based on an untrusted size value, but it does not validate or incorrectly validates the size, allowing arbitrary amounts of memory to be allocated.
0 1 0 0 1
CWE-340 Predictability Problems
The product uses a scheme that generates numbers or identifiers that are more predictable than required.
0 1 0 0 1
CWE-302 Authentication Bypass by Assumed-Immutable Data
The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.
0 0 1 0 1