Categories

CWE NAME LAST 12M LOW MEDIUM HIGH CRITICAL TOTAL VULNS
CWE-213 Intentional Information Exposure
The product's intended functionality exposes information to certain actors in accordance with the developer's security policy, but this information is regarded as sensitive according to the intended security policies of other stakeholders such as the product's administrator, users, or others whose information is being processed.
0 1 0 0 1
CWE-807 Reliance on Untrusted Inputs in a Security Decision
The application uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.
0 1 0 0 1
CWE-85 Doubled Character XSS Manipulations
The web application does not filter user-controlled input for executable script disguised using doubling of the involved characters.
0 1 0 0 1
CWE-598 Information Exposure Through Query Strings in GET Request
The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that requests.
1 0 0 0 1
CWE-300 Channel Accessible by Non-Endpoint ('Man-in-the-Middle')
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.
0 1 0 0 1
CWE-805 Buffer Access with Incorrect Length Value
The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer.
0 0 1 0 1
CWE-489 Leftover Debug Code
The application is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information.
0 1 0 0 1
CWE-379 Creation of Temporary File in Directory with Incorrect Permissions
The software creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file.
0 1 0 0 1
CWE-566 Authorization Bypass Through User-Controlled SQL Primary Key
The software uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor.
0 0 0 1 1
CWE-911 Improper Update of Reference Count
The software uses a reference count to manage a resource, but it does not update or incorrectly updates the reference count.
0 1 0 0 1