Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-232 | Improper Handling of Undefined Values The software does not handle or incorrectly handles when a value is not defined or supported for the associated parameter, field, or argument name. | 0 | 0 | 1 | 0 | 1 | |
CWE-762 | Mismatched Memory Management Routines The application attempts to return a memory resource to the system, but it calls a release function that is not compatible with the function that was originally used to allocate that resource. | 0 | 0 | 1 | 0 | 1 | |
CWE-242 | Use of Inherently Dangerous Function The program calls a function that can never be guaranteed to work safely. | 0 | 0 | 1 | 0 | 1 | |
CWE-141 | Improper Neutralization of Parameter/Argument Delimiters The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as parameter or argument delimiters when they are sent to a downstream component. | 0 | 1 | 0 | 0 | 1 | |
CWE-440 | Expected Behavior Violation A feature, API, or function being used by a product behaves differently than the product expects. | 0 | 1 | 0 | 0 | 1 | |
CWE-761 | Free of Pointer not at Start of Buffer The application calls free() on a pointer to a memory resource that was allocated on the heap, but the pointer is not at the start of the buffer. | 0 | 0 | 1 | 0 | 1 | |
CWE-268 | Privilege Chaining Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination. | 0 | 1 | 0 | 0 | 1 | |
CWE-87 | Improper Neutralization of Alternate XSS Syntax The software does not neutralize or incorrectly neutralizes user-controlled input for alternate script syntax. | 0 | 1 | 0 | 0 | 1 | |
CWE-226 | Sensitive Information Uncleared Before Release The product prepares to release a resource such as memory or a file so that the resource can be reused by other entities, but the product does not fully clear previously-used sensitive information from that resource before the resource is released. | 0 | 1 | 0 | 0 | 1 | |
CWE-244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') Using realloc() to resize buffers that store sensitive information can leave the sensitive information exposed to attack, because it is not removed from memory. | 0 | 0 | 1 | 0 | 1 |