Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-209 | Information Exposure Through an Error Message The software generates an error message that includes sensitive information about its environment, users, or associated data. | 24 | 207 | 37 | 16 | 284 | |
CWE-345 | Insufficient Verification of Data Authenticity The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. | 9 | 107 | 118 | 44 | 278 | |
CWE-399 | Resource Management Errors Weaknesses in this category are related to improper management of system resources. | 0 | 123 | 144 | 4 | 271 | |
CWE-307 | Improper Restriction of Excessive Authentication Attempts The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks. | 3 | 58 | 84 | 121 | 266 | |
CWE-310 | Cryptographic Issues Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed. | 9 | 50 | 190 | 9 | 258 | |
CWE-330 | Use of Insufficiently Random Values The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers. | 8 | 103 | 89 | 56 | 256 | |
CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition The software checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the software to perform invalid actions when the resource is in an unexpected state. | 11 | 89 | 149 | 3 | 252 | |
CWE-369 | Divide By Zero The product divides a value by zero. | 7 | 193 | 51 | 1 | 252 | |
CWE-384 | Session Fixation Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions. | 10 | 80 | 108 | 48 | 246 | |
CWE-1021 | Improper Restriction of Rendered UI Layers or Frames The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with. | 4 | 175 | 60 | 6 | 245 |