Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-805 | Buffer Access with Incorrect Length Value The software uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. | 0 | 0 | 1 | 0 | 1 | |
CWE-489 | Leftover Debug Code The application is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information. | 0 | 1 | 0 | 0 | 1 | |
CWE-379 | Creation of Temporary File in Directory with Incorrect Permissions The software creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file. | 0 | 1 | 0 | 0 | 1 | |
CWE-566 | Authorization Bypass Through User-Controlled SQL Primary Key The software uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor. | 0 | 0 | 0 | 1 | 1 | |
CWE-911 | Improper Update of Reference Count The software uses a reference count to manage a resource, but it does not update or incorrectly updates the reference count. | 0 | 1 | 0 | 0 | 1 | |
CWE-296 | Improper Following of a Certificate's Chain of Trust The software does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate. | 0 | 1 | 0 | 0 | 1 | |
CWE-804 | Guessable CAPTCHA The software uses a CAPTCHA challenge, but the challenge can be guessed or automatically recognized by a non-human actor. | 0 | 1 | 0 | 0 | 1 | |
CWE-303 | Incorrect Implementation of Authentication Algorithm The requirements for the software dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect. | 0 | 0 | 1 | 0 | 1 | |
CWE-921 | Storage of Sensitive Data in a Mechanism without Access Control The software stores sensitive information in a file system or device that does not have built-in access control. | 0 | 0 | 1 | 0 | 1 | |
CWE-230 | Improper Handling of Missing Values The software does not handle or incorrectly handles when a parameter, field, or argument name is specified, but the associated value is missing, i.e. it is empty, blank, or null. | 0 | 1 | 0 | 0 | 1 |