Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-918 | Server-Side Request Forgery (SSRF) The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. | 12 | 324 | 312 | 226 | 874 | |
CWE-276 | Incorrect Default Permissions The product, upon installation, sets incorrect permissions for an object that exposes it to an unintended actor. | 25 | 299 | 424 | 64 | 812 | |
CWE-362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently. | 34 | 358 | 397 | 6 | 795 | |
CWE-284 | Improper Access Control The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor. | 25 | 306 | 340 | 110 | 781 | |
CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. | 5 | 722 | 35 | 6 | 768 | |
CWE-74 | Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. | 10 | 254 | 316 | 158 | 738 | |
CWE-401 | Improper Release of Memory Before Removing Last Reference ('Memory Leak') The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory. | 14 | 493 | 208 | 1 | 716 | |
CWE-770 | Allocation of Resources Without Limits or Throttling The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor. | 3 | 308 | 328 | 10 | 649 | |
CWE-427 | Uncontrolled Search Path Element The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. | 0 | 55 | 528 | 19 | 602 | |
CWE-532 | Information Exposure Through Log Files Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. | 65 | 341 | 154 | 40 | 600 |