Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-843 | Access of Resource Using Incompatible Type ('Type Confusion') The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type. | 3 | 52 | 258 | 75 | 388 | |
CWE-617 | Reachable Assertion The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. | 2 | 168 | 205 | 1 | 376 | |
CWE-772 | Missing Release of Resource after Effective Lifetime The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed. | 7 | 236 | 126 | 6 | 375 | |
CWE-327 | Use of a Broken or Risky Cryptographic Algorithm The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information. | 9 | 122 | 193 | 43 | 367 | |
CWE-908 | Use of Uninitialized Resource The software uses or accesses a resource that has not been initialized. | 16 | 182 | 109 | 48 | 355 | |
CWE-347 | Improper Verification of Cryptographic Signature The software does not verify, or incorrectly verifies, the cryptographic signature for data. | 2 | 116 | 145 | 51 | 314 | |
CWE-326 | Inadequate Encryption Strength The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required. | 8 | 115 | 147 | 33 | 303 | |
CWE-129 | Improper Validation of Array Index The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array. | 0 | 57 | 200 | 40 | 297 | |
CWE-254 | 7PK - Security Features Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management. | 17 | 136 | 101 | 31 | 285 | |
CWE-667 | Improper Locking The software does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. | 6 | 210 | 67 | 1 | 284 |