Categories

CWE NAME LAST 12M LOW MEDIUM HIGH CRITICAL TOTAL VULNS
CWE-232 Improper Handling of Undefined Values
The software does not handle or incorrectly handles when a value is not defined or supported for the associated parameter, field, or argument name.
0 0 1 0 1
CWE-762 Mismatched Memory Management Routines
The application attempts to return a memory resource to the system, but it calls a release function that is not compatible with the function that was originally used to allocate that resource.
0 0 1 0 1
CWE-242 Use of Inherently Dangerous Function
The program calls a function that can never be guaranteed to work safely.
0 0 1 0 1
CWE-141 Improper Neutralization of Parameter/Argument Delimiters
The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as parameter or argument delimiters when they are sent to a downstream component.
0 1 0 0 1
CWE-440 Expected Behavior Violation
A feature, API, or function being used by a product behaves differently than the product expects.
0 1 0 0 1
CWE-761 Free of Pointer not at Start of Buffer
The application calls free() on a pointer to a memory resource that was allocated on the heap, but the pointer is not at the start of the buffer.
0 0 1 0 1
CWE-268 Privilege Chaining
Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.
0 1 0 0 1
CWE-87 Improper Neutralization of Alternate XSS Syntax
The software does not neutralize or incorrectly neutralizes user-controlled input for alternate script syntax.
0 1 0 0 1
CWE-226 Sensitive Information Uncleared Before Release
The product prepares to release a resource such as memory or a file so that the resource can be reused by other entities, but the product does not fully clear previously-used sensitive information from that resource before the resource is released.
0 1 0 0 1
CWE-244 Improper Clearing of Heap Memory Before Release ('Heap Inspection')
Using realloc() to resize buffers that store sensitive information can leave the sensitive information exposed to attack, because it is not removed from memory.
0 0 1 0 1