Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-544 | Missing Standardized Error Handling Mechanism The software does not use a standardized method for handling errors throughout the code, which might introduce inconsistent error handling and resultant weaknesses. | 0 | 1 | 0 | 0 | 1 | |
CWE-437 | Incomplete Model of Endpoint Features A product acts as an intermediary or monitor between two or more endpoints, but it does not have a complete model of an endpoint's features, behaviors, or state, potentially causing the product to perform incorrect actions based on this incomplete model. | 0 | 0 | 1 | 0 | 1 | |
CWE-779 | Logging of Excessive Data The software logs too much information, making log files hard to process and possibly hindering recovery efforts or forensic analysis after an attack. | 0 | 0 | 1 | 0 | 1 | |
CWE-530 | Exposure of Backup File to an Unauthorized Control Sphere A backup file is stored in a directory or archive that is made accessible to unauthorized actors. | 0 | 0 | 1 | 0 | 1 | |
CWE-780 | Use of RSA Algorithm without OAEP The software uses the RSA algorithm but does not incorporate Optimal Asymmetric Encryption Padding (OAEP), which might weaken the encryption. | 0 | 1 | 0 | 0 | 1 | |
CWE-602 | Client-Side Enforcement of Server-Side Security The software is composed of a server that relies on the client to implement a mechanism that is intended to protect the server. | 0 | 1 | 0 | 0 | 1 | |
CWE-213 | Intentional Information Exposure The product's intended functionality exposes information to certain actors in accordance with the developer's security policy, but this information is regarded as sensitive according to the intended security policies of other stakeholders such as the product's administrator, users, or others whose information is being processed. | 0 | 1 | 0 | 0 | 1 | |
CWE-807 | Reliance on Untrusted Inputs in a Security Decision The application uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism. | 0 | 1 | 0 | 0 | 1 | |
CWE-85 | Doubled Character XSS Manipulations The web application does not filter user-controlled input for executable script disguised using doubling of the involved characters. | 0 | 1 | 0 | 0 | 1 | |
CWE-489 | Leftover Debug Code The application is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information. | 0 | 1 | 0 | 0 | 1 |