Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-41 | Improper Resolution of Path Equivalence The system or application is vulnerable to file system contents disclosure through path equivalence. Path equivalence involves the use of special characters in file and directory names. The associated manipulations are intended to generate multiple names for the same object. | 0 | 1 | 0 | 0 | 1 | |
CWE-274 | Improper Handling of Insufficient Privileges The software does not handle or incorrectly handles when it has insufficient privileges to perform an operation, leading to resultant weaknesses. | 0 | 1 | 0 | 0 | 1 | |
CWE-289 | Authentication Bypass by Alternate Name The software performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor. | 0 | 0 | 1 | 0 | 1 | |
CWE-506 | Embedded Malicious Code The application contains code that appears to be malicious in nature. | 0 | 0 | 1 | 0 | 1 | |
CWE-1049 | Excessive Data Query Operations in a Large Data Table The software performs a data query with a large number of joins and sub-queries on a large data table. | 0 | 0 | 1 | 0 | 1 | |
CWE-1230 | Exposure of Sensitive Information Through Metadata The product prevents direct access to a resource containing sensitive information, but it does not sufficiently limit access to metadata that is derived from the original, sensitive information. | 0 | 0 | 1 | 0 | 1 | |
CWE-410 | Insufficient Resource Pool The software's resource pool is not large enough to handle peak demand, which allows an attacker to prevent others from accessing the resource by using a (relatively) large number of requests for resources. | 0 | 0 | 1 | 0 | 1 | |
CWE-1039 | Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations The product uses an automated mechanism such as machine learning to recognize complex data inputs (e.g. image or audio) as a particular concept or category, but it does not properly detect or handle inputs that have been modified or constructed in a way that causes the mechanism to detect a different, incorrect concept. | 0 | 1 | 0 | 0 | 1 | |
CWE-1240 | Use of a Risky Cryptographic Primitive The product implements a cryptographic algorithm using a non-standard or unproven cryptographic primitive. | 0 | 1 | 0 | 0 | 1 | |
CWE-167 | Improper Handling of Additional Special Element The software receives input from an upstream component, but it does not handle or incorrectly handles when an additional unexpected special element is provided. | 0 | 0 | 1 | 0 | 1 |