Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-434 | Unrestricted Upload of File with Dangerous Type The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. | 11 | 662 | 664 | 370 | 1707 | |
CWE-862 | Missing Authorization The software does not perform an authorization check when an actor attempts to access a resource or perform an action. | 132 | 1137 | 340 | 79 | 1688 | |
CWE-77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. | 3 | 356 | 460 | 450 | 1269 | |
CWE-863 | Incorrect Authorization The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. | 105 | 817 | 237 | 89 | 1248 | |
CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. | 54 | 790 | 358 | 6 | 1208 | |
CWE-362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently. | 138 | 648 | 264 | 42 | 1092 | |
CWE-284 | Improper Access Control The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor. | 96 | 604 | 216 | 147 | 1063 | |
CWE-189 | Numeric Errors Weaknesses in this category are related to improper calculation or conversion of numbers. | 20 | 458 | 210 | 373 | 1061 | |
CWE-732 | Incorrect Permission Assignment for Critical Resource The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. | 115 | 570 | 286 | 61 | 1032 | |
CWE-798 | Use of Hard-coded Credentials The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. | 51 | 294 | 325 | 299 | 969 |