Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-391 | Unchecked Error Condition [PLANNED FOR DEPRECATION. SEE MAINTENANCE NOTES.] Ignoring exceptions and other error conditions may allow an attacker to induce unexpected behavior unnoticed. | 0 | 1 | 0 | 0 | 1 | |
CWE-233 | Improper Handling of Parameters The software does not properly handle when the expected number of parameters, fields, or arguments is not provided in input, or if those parameters are undefined. | 0 | 1 | 0 | 0 | 1 | |
CWE-286 | Incorrect User Management The software does not properly manage a user within its environment. | 0 | 0 | 1 | 0 | 1 | |
CWE-334 | Small Space of Random Values The number of possible random values is smaller than needed by the product, making it more susceptible to brute force attacks. | 0 | 1 | 0 | 0 | 1 | |
CWE-351 | Insufficient Type Distinction The software does not properly distinguish between different types of elements in a way that leads to insecure behavior. | 0 | 1 | 0 | 0 | 1 | |
CWE-826 | Premature Release of Resource During Expected Lifetime The program releases a resource that is still intended to be used by the program itself or another actor. | 0 | 0 | 1 | 0 | 1 | |
CWE-402 | Transmission of Private Resources into a New Sphere ('Resource Leak') The software makes resources available to untrusted parties when those resources are only intended to be accessed by the software. | 0 | 1 | 0 | 0 | 1 | |
CWE-789 | Uncontrolled Memory Allocation The product allocates memory based on an untrusted size value, but it does not validate or incorrectly validates the size, allowing arbitrary amounts of memory to be allocated. | 0 | 1 | 0 | 0 | 1 | |
CWE-340 | Predictability Problems The product uses a scheme that generates numbers or identifiers that are more predictable than required. | 0 | 1 | 0 | 0 | 1 | |
CWE-302 | Authentication Bypass by Assumed-Immutable Data The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker. | 0 | 0 | 1 | 0 | 1 |