Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-409 | Improper Handling of Highly Compressed Data (Data Amplification) The software does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output. | 0 | 1 | 0 | 0 | 1 | |
CWE-127 | Buffer Under-read The software reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations prior to the targeted buffer. | 0 | 1 | 0 | 0 | 1 | |
CWE-472 | External Control of Assumed-Immutable Web Parameter The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable, such as hidden form fields. | 0 | 1 | 0 | 0 | 1 | |
CWE-410 | Insufficient Resource Pool The software's resource pool is not large enough to handle peak demand, which allows an attacker to prevent others from accessing the resource by using a (relatively) large number of requests for resources. | 0 | 0 | 1 | 0 | 1 | |
CWE-1039 | Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations The product uses an automated mechanism such as machine learning to recognize complex data inputs (e.g. image or audio) as a particular concept or category, but it does not properly detect or handle inputs that have been modified or constructed in a way that causes the mechanism to detect a different, incorrect concept. | 0 | 1 | 0 | 0 | 1 | |
CWE-349 | Acceptance of Extraneous Untrusted Data With Trusted Data The software, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted. | 0 | 0 | 1 | 0 | 1 | |
CWE-1240 | Use of a Risky Cryptographic Primitive The product implements a cryptographic algorithm using a non-standard or unproven cryptographic primitive. | 0 | 1 | 0 | 0 | 1 | |
CWE-130 | Improper Handling of Length Parameter Inconsistency The software parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data. | 0 | 0 | 1 | 0 | 1 | |
CWE-167 | Improper Handling of Additional Special Element The software receives input from an upstream component, but it does not handle or incorrectly handles when an additional unexpected special element is provided. | 0 | 0 | 1 | 0 | 1 | |
CWE-825 | Expired Pointer Dereference The program dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid. | 0 | 1 | 0 | 0 | 1 |