Categories

CWE NAME LAST 12M LOW MEDIUM HIGH CRITICAL TOTAL VULNS
CWE-918 Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
12 324 312 226 874
CWE-276 Incorrect Default Permissions
The product, upon installation, sets incorrect permissions for an object that exposes it to an unintended actor.
25 299 424 64 812
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
34 358 397 6 795
CWE-284 Improper Access Control
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
25 306 340 110 781
CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
5 722 35 6 768
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
10 254 316 158 738
CWE-401 Improper Release of Memory Before Removing Last Reference ('Memory Leak')
The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
14 493 208 1 716
CWE-770 Allocation of Resources Without Limits or Throttling
The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
3 308 328 10 649
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
0 55 528 19 602
CWE-532 Information Exposure Through Log Files
Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.
65 341 154 40 600