Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-379 | Creation of Temporary File in Directory with Incorrect Permissions The software creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file. | 0 | 1 | 0 | 0 | 1 | |
CWE-566 | Authorization Bypass Through User-Controlled SQL Primary Key The software uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor. | 0 | 0 | 0 | 1 | 1 | |
CWE-911 | Improper Update of Reference Count The software uses a reference count to manage a resource, but it does not update or incorrectly updates the reference count. | 0 | 1 | 0 | 0 | 1 | |
CWE-296 | Improper Following of a Certificate's Chain of Trust The software does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate. | 0 | 1 | 0 | 0 | 1 | |
CWE-804 | Guessable CAPTCHA The software uses a CAPTCHA challenge, but the challenge can be guessed or automatically recognized by a non-human actor. | 0 | 1 | 0 | 0 | 1 | |
CWE-303 | Incorrect Implementation of Authentication Algorithm The requirements for the software dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect. | 0 | 0 | 1 | 0 | 1 | |
CWE-230 | Improper Handling of Missing Values The software does not handle or incorrectly handles when a parameter, field, or argument name is specified, but the associated value is missing, i.e. it is empty, blank, or null. | 0 | 1 | 0 | 0 | 1 | |
CWE-150 | Improper Neutralization of Escape, Meta, or Control Sequences The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component. | 0 | 0 | 1 | 0 | 1 | |
CWE-215 | Information Exposure Through Debug Information The application inserts sensitive information into debugging code, which could expose this information if the debugging code is not disabled in production. | 1 | 0 | 0 | 0 | 1 | |
CWE-305 | Authentication Bypass by Primary Weakness The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. | 0 | 1 | 0 | 0 | 1 |