Categories
CWE | NAME | LAST 12M | LOW | MEDIUM | HIGH | CRITICAL | TOTAL VULNS |
---|---|---|---|---|---|---|---|
CWE-754 | Improper Check for Unusual or Exceptional Conditions The software does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software. | 3 | 115 | 114 | 8 | 240 | |
CWE-665 | Improper Initialization The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used. | 9 | 120 | 97 | 12 | 238 | |
CWE-311 | Missing Encryption of Sensitive Data The software does not encrypt sensitive or critical information before storage or transmission. | 16 | 112 | 89 | 18 | 235 | |
CWE-346 | Origin Validation Error The software does not properly verify that the source of data or communication is valid. | 0 | 121 | 79 | 24 | 224 | |
CWE-613 | Insufficient Session Expiration According to WASC, Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization. | 11 | 83 | 88 | 42 | 224 | |
CWE-674 | Uncontrolled Recursion The product does not properly control the amount of recursion that takes place, which consumes excessive resources, such as allocated memory or the program stack. | 2 | 106 | 109 | 2 | 219 | |
CWE-552 | Files or Directories Accessible to External Parties The product makes files or directories accessible to unauthorized actors, even though they should not be. | 10 | 87 | 101 | 9 | 207 | |
CWE-704 | Incorrect Type Conversion or Cast The software does not correctly convert an object, resource, or structure from one type to a different type. | 1 | 12 | 175 | 13 | 201 | |
CWE-404 | Improper Resource Shutdown or Release The program does not release or incorrectly releases a resource before it is made available for re-use. | 1 | 87 | 102 | 1 | 191 | |
CWE-116 | Improper Encoding or Escaping of Output The software prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. | 3 | 92 | 66 | 28 | 189 |