Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-189 | Numeric Errors Weaknesses in this category are related to improper calculation or conversion of numbers. | 29 | 555 | 253 | 387 | 1224 | |
CWE-434 | Unrestricted Upload of File with Dangerous Type The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. | 11 | 658 | 399 | 141 | 1209 | |
CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. | 53 | 572 | 399 | 184 | 1208 | |
CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. | 78 | 859 | 243 | 4 | 1184 | |
CWE-77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. | 4 | 391 | 356 | 328 | 1079 | |
CWE-284 | Improper Access Control The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor. | 105 | 642 | 189 | 135 | 1071 | |
CWE-362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently. | 136 | 625 | 125 | 41 | 927 | |
CWE-732 | Incorrect Permission Assignment for Critical Resource The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. | 125 | 535 | 169 | 57 | 886 | |
CWE-59 | Improper Link Resolution Before File Access ('Link Following') The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. | 240 | 408 | 119 | 16 | 783 | |
CWE-798 | Use of Hard-coded Credentials The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. | 54 | 273 | 251 | 203 | 781 |