Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-213 | Intentional Information Exposure The product's intended functionality exposes information to certain actors in accordance with the developer's security policy, but this information is regarded as sensitive according to the intended security policies of other stakeholders such as the product's administrator, users, or others whose information is being processed. | 0 | 1 | 0 | 0 | 1 | |
CWE-807 | Reliance on Untrusted Inputs in a Security Decision The application uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism. | 0 | 1 | 0 | 0 | 1 | |
CWE-85 | Doubled Character XSS Manipulations The web application does not filter user-controlled input for executable script disguised using doubling of the involved characters. | 0 | 1 | 0 | 0 | 1 | |
CWE-598 | Information Exposure Through Query Strings in GET Request The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that requests. | 1 | 0 | 0 | 0 | 1 | |
CWE-300 | Channel Accessible by Non-Endpoint ('Man-in-the-Middle') The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint. | 0 | 1 | 0 | 0 | 1 | |
CWE-805 | Buffer Access with Incorrect Length Value The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | 0 | 0 | 1 | 0 | 1 | |
CWE-489 | Leftover Debug Code The application is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information. | 0 | 1 | 0 | 0 | 1 | |
CWE-379 | Creation of Temporary File in Directory with Incorrect Permissions The software creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file. | 0 | 1 | 0 | 0 | 1 | |
CWE-566 | Authorization Bypass Through User-Controlled SQL Primary Key The software uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor. | 0 | 0 | 0 | 1 | 1 | |
CWE-911 | Improper Update of Reference Count The software uses a reference count to manage a resource, but it does not update or incorrectly updates the reference count. | 0 | 1 | 0 | 0 | 1 |