Categories

CWE NAME LAST 12M LOW MEDIUM HIGH CRITICAL TOTAL VULNS
CWE-41 Improper Resolution of Path Equivalence
The system or application is vulnerable to file system contents disclosure through path equivalence. Path equivalence involves the use of special characters in file and directory names. The associated manipulations are intended to generate multiple names for the same object.
0 1 0 0 1
CWE-274 Improper Handling of Insufficient Privileges
The software does not handle or incorrectly handles when it has insufficient privileges to perform an operation, leading to resultant weaknesses.
0 1 0 0 1
CWE-289 Authentication Bypass by Alternate Name
The software performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor.
0 0 1 0 1
CWE-506 Embedded Malicious Code
The application contains code that appears to be malicious in nature.
0 0 1 0 1
CWE-1049 Excessive Data Query Operations in a Large Data Table
The software performs a data query with a large number of joins and sub-queries on a large data table.
0 0 1 0 1
CWE-1230 Exposure of Sensitive Information Through Metadata
The product prevents direct access to a resource containing sensitive information, but it does not sufficiently limit access to metadata that is derived from the original, sensitive information.
0 0 1 0 1
CWE-410 Insufficient Resource Pool
The software's resource pool is not large enough to handle peak demand, which allows an attacker to prevent others from accessing the resource by using a (relatively) large number of requests for resources.
0 0 1 0 1
CWE-1039 Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations
The product uses an automated mechanism such as machine learning to recognize complex data inputs (e.g. image or audio) as a particular concept or category, but it does not properly detect or handle inputs that have been modified or constructed in a way that causes the mechanism to detect a different, incorrect concept.
0 1 0 0 1
CWE-1240 Use of a Risky Cryptographic Primitive
The product implements a cryptographic algorithm using a non-standard or unproven cryptographic primitive.
0 1 0 0 1
CWE-167 Improper Handling of Additional Special Element
The software receives input from an upstream component, but it does not handle or incorrectly handles when an additional unexpected special element is provided.
0 0 1 0 1