Categories

CWE NAME LAST 12M LOW MEDIUM HIGH CRITICAL TOTAL VULNS
CWE-379 Creation of Temporary File in Directory with Incorrect Permissions
The software creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file.
0 1 0 0 1
CWE-566 Authorization Bypass Through User-Controlled SQL Primary Key
The software uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor.
0 0 0 1 1
CWE-911 Improper Update of Reference Count
The software uses a reference count to manage a resource, but it does not update or incorrectly updates the reference count.
0 1 0 0 1
CWE-296 Improper Following of a Certificate's Chain of Trust
The software does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate.
0 1 0 0 1
CWE-804 Guessable CAPTCHA
The software uses a CAPTCHA challenge, but the challenge can be guessed or automatically recognized by a non-human actor.
0 1 0 0 1
CWE-303 Incorrect Implementation of Authentication Algorithm
The requirements for the software dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.
0 0 1 0 1
CWE-230 Improper Handling of Missing Values
The software does not handle or incorrectly handles when a parameter, field, or argument name is specified, but the associated value is missing, i.e. it is empty, blank, or null.
0 1 0 0 1
CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences
The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component.
0 0 1 0 1
CWE-215 Information Exposure Through Debug Information
The application inserts sensitive information into debugging code, which could expose this information if the debugging code is not disabled in production.
1 0 0 0 1
CWE-305 Authentication Bypass by Primary Weakness
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
0 1 0 0 1