Categories

CWE NAME LAST 12M LOW MEDIUM HIGH CRITICAL TOTAL VULNS
CWE-278 Insecure Preserved Inherited Permissions
A product inherits a set of insecure permissions for an object, e.g. when copying from an archive file, without user awareness or involvement.
0 0 1 0 1
CWE-648 Incorrect Use of Privileged APIs
The application does not conform to the API requirements for a function call that requires extra privileges. This could allow attackers to gain privileges by causing the function to be called incorrectly.
0 0 1 0 1
CWE-573 Improper Following of Specification by Caller
The software does not follow or incorrectly follows the specifications as required by the implementation language, environment, framework, protocol, or platform.
1 0 0 0 1
CWE-214 Information Exposure Through Process Environment
A process is invoked with sensitive command-line arguments, environment variables, or other elements that can be seen by other processes on the operating system.
0 1 0 0 1
CWE-390 Detection of Error Condition Without Action
The software detects a specific error, but takes no actions to handle the error.
0 0 1 0 1
CWE-124 Buffer Underwrite ('Buffer Underflow')
The software writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
0 1 0 0 1
CWE-606 Unchecked Input for Loop Condition
The product does not properly check inputs that are used for loop conditions, potentially leading to a denial of service or other consequences because of excessive looping.
0 0 1 0 1
CWE-260 Password in Configuration File
The software stores a password in a configuration file that might be accessible to actors who do not know the password.
0 0 1 0 1
CWE-232 Improper Handling of Undefined Values
The software does not handle or incorrectly handles when a value is not defined or supported for the associated parameter, field, or argument name.
0 0 1 0 1
CWE-762 Mismatched Memory Management Routines
The application attempts to return a memory resource to the system, but it calls a release function that is not compatible with the function that was originally used to allocate that resource.
0 0 1 0 1