CWE List

ID Name Occurrences
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 2423
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 1728
CWE-122 Heap-based Buffer Overflow 1430
CWE-416 Use After Free 1284
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') 1266
CWE-94 Improper Control of Generation of Code ('Code Injection') 871
CWE-125 Out-of-bounds Read 826
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer 681
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 608
CWE-862 Missing Authorization 601
CWE-121 Stack-based Buffer Overflow 594
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 556
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor 515
CWE-284 Improper Access Control 510
CWE-20 Improper Input Validation 505
CWE-434 Unrestricted Upload of File with Dangerous Type 492
CWE-502 Deserialization of Untrusted Data 414
CWE-352 Cross-Site Request Forgery (CSRF) 411
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') 373
CWE-190 Integer Overflow or Wraparound 360
CWE-787 Out-of-bounds Write 352
CWE-476 NULL Pointer Dereference 310
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') 296
CWE-306 Missing Authentication for Critical Function 296
CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') 266
CWE-400 Uncontrolled Resource Consumption 263
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 262
CWE-59 Improper Link Resolution Before File Access ('Link Following') 238
CWE-287 Improper Authentication 224
CWE-918 Server-Side Request Forgery (SSRF) 221
CWE-415 Double Free 200
CWE-126 Buffer Over-read 184
CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition 176
CWE-693 Protection Mechanism Failure 170
CWE-285 Improper Authorization 169
CWE-822 Untrusted Pointer Dereference 167
CWE-863 Incorrect Authorization 165
CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') 159
CWE-266 Incorrect Privilege Assignment 154
CWE-770 Allocation of Resources Without Limits or Throttling 146
CWE-908 Use of Uninitialized Resource 143
CWE-269 Improper Privilege Management 142
CWE-798 Use of Hard-coded Credentials 125
CWE-295 Improper Certificate Validation 118
CWE-73 External Control of File Name or Path 104
CWE-532 Insertion of Sensitive Information into Log File 101
CWE-601 URL Redirection to Untrusted Site ('Open Redirect') 100
CWE-639 Authorization Bypass Through User-Controlled Key 93
CWE-288 Authentication Bypass Using an Alternate Path or Channel 87
CWE-191 Integer Underflow (Wrap or Wraparound) 86
CWE-404 Improper Resource Shutdown or Release 84
CWE-427 Uncontrolled Search Path Element 80
CWE-23 Relative Path Traversal 80
CWE-276 Incorrect Default Permissions 79
CWE-732 Incorrect Permission Assignment for Critical Resource 72
CWE-611 Improper Restriction of XML External Entity Reference 72
CWE-926 Improper Export of Android Application Components 71
CWE-1037 Processor Optimization Removal or Modification of Security-critical Code 69
CWE-307 Improper Restriction of Excessive Authentication Attempts 66
CWE-327 Use of a Broken or Risky Cryptographic Algorithm 65
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere 60
CWE-617 Reachable Assertion 58
CWE-312 Cleartext Storage of Sensitive Information 58
CWE-522 Insufficiently Protected Credentials 55
CWE-209 Generation of Error Message Containing Sensitive Information 55
CWE-401 Missing Release of Memory after Effective Lifetime 54
CWE-280 Improper Handling of Insufficient Permissions or Privileges 53
CWE-347 Improper Verification of Cryptographic Signature 52
CWE-259 Use of Hard-coded Password 52
CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) 51
CWE-353 Missing Support for Integrity Check 51
CWE-1333 Inefficient Regular Expression Complexity 50
CWE-426 Untrusted Search Path 49
CWE-201 Insertion of Sensitive Information Into Sent Data 49
CWE-319 Cleartext Transmission of Sensitive Information 46
CWE-591 Sensitive Data Storage in Improperly Locked Memory 43
CWE-1390 Weak Authentication 43
CWE-754 Improper Check for Unusual or Exceptional Conditions 42
CWE-197 Numeric Truncation Error 42
CWE-203 Observable Discrepancy 41
CWE-36 Absolute Path Traversal 40
CWE-250 Execution with Unnecessary Privileges 40
CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop') 39
CWE-613 Insufficient Session Expiration 39
CWE-457 Use of Uninitialized Variable 38
CWE-674 Uncontrolled Recursion 36
CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') 33
CWE-820 Missing Synchronization 33
CWE-451 User Interface (UI) Misrepresentation of Critical Information 33
CWE-290 Authentication Bypass by Spoofing 33
CWE-1392 Use of Default Credentials 33
CWE-35 Path Traversal: '.../...//' 32
CWE-321 Use of Hard-coded Cryptographic Key 32
CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data 31
CWE-829 Inclusion of Functionality from Untrusted Control Sphere 30
CWE-668 Exposure of Resource to Wrong Sphere 29
CWE-552 Files or Directories Accessible to External Parties 29
CWE-501 Trust Boundary Violation 29
CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') 29
CWE-359 Exposure of Private Personal Information to an Unauthorized Actor 29
CWE-268 Privilege Chaining 29
CWE-1287 Improper Validation of Specified Type of Input 29
CWE-357 Insufficient UI Warning of Dangerous Operations 28
CWE-1188 Initialization of a Resource with an Insecure Default 27
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) 26
CWE-302 Authentication Bypass by Assumed-Immutable Data 26
CWE-824 Access of Uninitialized Pointer 25
CWE-602 Client-Side Enforcement of Server-Side Security 25
CWE-248 Uncaught Exception 25
CWE-1220 Insufficient Granularity of Access Control 25
CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') 24
CWE-129 Improper Validation of Array Index 23
CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input 23
CWE-521 Weak Password Requirements 22
CWE-346 Origin Validation Error 22
CWE-1021 Improper Restriction of Rendered UI Layers or Frames 22
CWE-912 Hidden Functionality 21
CWE-755 Improper Handling of Exceptional Conditions 21
CWE-345 Insufficient Verification of Data Authenticity 21
CWE-331 Insufficient Entropy 21
CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine 21
CWE-506 Embedded Malicious Code 20
CWE-384 Session Fixation 20
CWE-257 Storing Passwords in a Recoverable Format 20
CWE-680 Integer Overflow to Buffer Overflow 19
CWE-610 Externally Controlled Reference to a Resource in Another Sphere 19
CWE-305 Authentication Bypass by Primary Weakness 19
CWE-124 Buffer Underwrite ('Buffer Underflow') 19
CWE-789 Memory Allocation with Excessive Size Value 18
CWE-667 Improper Locking 18
CWE-24 Path Traversal: '../filedir' 18
CWE-208 Observable Timing Discrepancy 18
CWE-183 Permissive List of Allowed Inputs 18
CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') 18
CWE-923 Improper Restriction of Communication Channel to Intended Endpoints 17
CWE-328 Use of Weak Hash 17
CWE-326 Inadequate Encryption Strength 17
CWE-311 Missing Encryption of Sensitive Data 17
CWE-1284 Improper Validation of Specified Quantity in Input 17
CWE-116 Improper Encoding or Escaping of Output 17
CWE-825 Expired Pointer Dereference 16
CWE-256 Plaintext Storage of a Password 16
CWE-204 Observable Response Discrepancy 16
CWE-193 Off-by-one Error 16
CWE-1236 Improper Neutralization of Formula Elements in a CSV File 16
CWE-117 Improper Output Neutralization for Logs 16
CWE-707 Improper Neutralization 15
CWE-648 Incorrect Use of Privileged APIs 15
CWE-494 Download of Code Without Integrity Check 15
CWE-428 Unquoted Search Path or Element 14
CWE-134 Use of Externally-Controlled Format String 14
CWE-1286 Improper Validation of Syntactic Correctness of Input 14
CWE-922 Insecure Storage of Sensitive Information 13
CWE-807 Reliance on Untrusted Inputs in a Security Decision 13
CWE-681 Incorrect Conversion between Numeric Types 13
CWE-640 Weak Password Recovery Mechanism for Forgotten Password 13
CWE-459 Incomplete Cleanup 13
CWE-449 The UI Performs the Wrong Action 13
CWE-340 Generation of Predictable Numbers or Identifiers 13
CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection') 12
CWE-664 Improper Control of a Resource Through its Lifetime 12
CWE-61 UNIX Symbolic Link (Symlink) Following 12
CWE-420 Unprotected Alternate Channel 12
CWE-354 Improper Validation of Integrity Check Value 12
CWE-272 Least Privilege Violation 12
CWE-1391 Use of Weak Credentials 12
CWE-131 Incorrect Calculation of Buffer Size 12
CWE-99 Improper Control of Resource Identifiers ('Resource Injection') 11
CWE-799 Improper Control of Interaction Frequency 11
CWE-691 Insufficient Control Flow Management 11
CWE-598 Use of GET Request Method With Sensitive Query Strings 11
CWE-41 Improper Resolution of Path Equivalence 11
CWE-303 Incorrect Implementation of Authentication Algorithm 11
CWE-833 Deadlock 10
CWE-772 Missing Release of Resource after Effective Lifetime 10
CWE-669 Incorrect Resource Transfer Between Spheres 10
CWE-653 Improper Isolation or Compartmentalization 10
CWE-472 External Control of Assumed-Immutable Web Parameter 10
CWE-167 Improper Handling of Additional Special Element 10
CWE-1395 Dependency on Vulnerable Third-Party Component 10
CWE-130 Improper Handling of Length Parameter Inconsistency 10
CWE-1230 Exposure of Sensitive Information Through Metadata 10
CWE-91 XML Injection (aka Blind XPath Injection) 9
CWE-425 Direct Request ('Forced Browsing') 9
CWE-378 Creation of Temporary File With Insecure Permissions 9
CWE-358 Improperly Implemented Security Check for Standard 9
CWE-277 Insecure Inherited Permissions 9
CWE-252 Unchecked Return Value 9
CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer 9
CWE-1393 Use of Default Password 9
CWE-916 Use of Password Hash With Insufficient Computational Effort 8
CWE-684 Incorrect Provision of Specified Functionality 8
CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute 8
CWE-526 Cleartext Storage of Sensitive Information in an Environment Variable 8
CWE-407 Inefficient Algorithmic Complexity 8
CWE-402 Transmission of Private Resources into a New Sphere ('Resource Leak') 8
CWE-369 Divide By Zero 8
CWE-297 Improper Validation of Certificate with Host Mismatch 8
CWE-294 Authentication Bypass by Capture-replay 8
CWE-282 Improper Ownership Management 8
CWE-267 Privilege Defined With Unsafe Actions 8
CWE-260 Password in Configuration File 8
CWE-156 Improper Neutralization of Whitespace 8
CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences 8
CWE-1244 Internal Asset Exposed to Unsafe Debug Access Level or State 8
CWE-1191 On-Chip Debug and Test Interface With Improper Access Control 8
CWE-1104 Use of Unmaintained Third Party Components 8
CWE-682 Incorrect Calculation 7
CWE-672 Operation on a Resource after Expiration or Release 7
CWE-665 Improper Initialization 7
CWE-662 Improper Synchronization 7
CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax 7
CWE-64 Windows Shortcut Following (.LNK) 7
CWE-440 Expected Behavior Violation 7
CWE-436 Interpretation Conflict 7
CWE-364 Signal Handler Race Condition 7
CWE-304 Missing Critical Step in Authentication 7
CWE-184 Incomplete List of Disallowed Inputs 7
CWE-158 Improper Neutralization of Null Byte or NUL Character 7
CWE-15 External Control of System or Configuration Setting 7
CWE-805 Buffer Access with Incorrect Length Value 6
CWE-782 Exposed IOCTL with Insufficient Access Control 6
CWE-733 Compiler Optimization Removal or Modification of Security-critical Code 6
CWE-704 Incorrect Type Conversion or Cast 6
CWE-703 Improper Check or Handling of Exceptional Conditions 6
CWE-697 Incorrect Comparison 6
CWE-641 Improper Restriction of Names for Files and Other Resources 6
CWE-620 Unverified Password Change 6
CWE-590 Free of Memory not on the Heap 6
CWE-548 Exposure of Information Through Directory Listing 6
CWE-528 Exposure of Core Dump File to an Unauthorized Control Sphere 6
CWE-524 Use of Cache Containing Sensitive Information 6
CWE-489 Active Debug Code 6
CWE-409 Improper Handling of Highly Compressed Data (Data Amplification) 6
CWE-393 Return of Wrong Status Code 6
CWE-330 Use of Insufficiently Random Values 6
CWE-325 Missing Cryptographic Step 6
CWE-316 Cleartext Storage of Sensitive Information in Memory 6
CWE-300 Channel Accessible by Non-Endpoint 6
CWE-29 Path Traversal: '\..\filename' 6
CWE-253 Incorrect Check of Function Return Value 6
CWE-1394 Use of Default Cryptographic Key 6
CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains 5
CWE-940 Improper Verification of Source of a Communication Channel 5
CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') 5
CWE-823 Use of Out-of-range Pointer Offset 5
CWE-749 Exposed Dangerous Method or Function 5
CWE-706 Use of Incorrectly-Resolved Name or Reference 5
CWE-540 Inclusion of Sensitive Information in Source Code 5
CWE-44 Path Equivalence: 'file.name' (Internal Dot) 5
CWE-385 Covert Timing Channel 5
CWE-279 Incorrect Execution-Assigned Permissions 5
CWE-241 Improper Handling of Unexpected Data Type 5
CWE-233 Improper Handling of Parameters 5
CWE-215 Insertion of Sensitive Information Into Debugging Code 5
CWE-1419 Incorrect Initialization of Resource 5
CWE-1385 Missing Origin Validation in WebSockets 5
CWE-1288 Improper Validation of Consistency within Input 5
CWE-1263 Improper Physical Access Control 5
CWE-114 Process Control 5
CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') 5
CWE-1022 Use of Web Link to Untrusted Target with window.opener Access 5
CWE-909 Missing Initialization of Resource 4
CWE-837 Improper Enforcement of a Single, Unique Action 4
CWE-836 Use of Password Hash Instead of Password for Authentication 4
CWE-821 Incorrect Synchronization 4
CWE-779 Logging of Excessive Data 4
CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') 4
CWE-698 Execution After Redirect (EAR) 4
CWE-686 Function Call With Incorrect Argument Type 4
CWE-650 Trusting HTTP Permission Methods on the Server Side 4
CWE-643 Improper Neutralization of Data within XPath Expressions ('XPath Injection') 4
CWE-642 External Control of Critical State Data 4
CWE-636 Not Failing Securely ('Failing Open') 4
CWE-606 Unchecked Input for Loop Condition 4
CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory 4
CWE-523 Unprotected Transport of Credentials 4
CWE-488 Exposure of Data Element to Wrong Session 4
CWE-473 PHP External Variable Modification 4
CWE-446 UI Discrepancy for Security Feature 4
CWE-424 Improper Protection of Alternate Path 4
CWE-406 Insufficient Control of Network Message Volume (Network Amplification) 4
CWE-351 Insufficient Type Distinction 4
CWE-348 Use of Less Trusted Source 4
CWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG) 4
CWE-286 Incorrect User Management 4
CWE-283 Unverified Ownership 4
CWE-281 Improper Preservation of Permissions 4
CWE-273 Improper Check for Dropped Privileges 4
CWE-270 Privilege Context Switching Error 4
CWE-258 Empty Password in Configuration File 4
CWE-244 Improper Clearing of Heap Memory Before Release ('Heap Inspection') 4
CWE-153 Improper Neutralization of Substitution Characters 4
CWE-146 Improper Neutralization of Expression/Command Delimiters 4
CWE-1421 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution 4
CWE-1420 Exposure of Sensitive Information during Transient Execution 4
CWE-140 Improper Neutralization of Delimiters 4
CWE-138 Improper Neutralization of Special Elements 4
CWE-1242 Inclusion of Undocumented Features or Chicken Bits 4
CWE-115 Misinterpretation of Input 4
CWE-1004 Sensitive Cookie Without 'HttpOnly' Flag 4
CWE-913 Improper Control of Dynamically-Managed Code Resources 3
CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') 3
CWE-84 Improper Neutralization of Encoded URI Schemes in a Web Page 3
CWE-788 Access of Memory Location After End of Buffer 3
CWE-778 Insufficient Logging 3
CWE-771 Missing Reference to Active Allocated Resource 3
CWE-763 Release of Invalid Pointer or Reference 3
CWE-645 Overly Restrictive Account Lockout Mechanism 3
CWE-525 Use of Web Browser Cache Containing Sensitive Information 3
CWE-480 Use of Incorrect Operator 3
CWE-471 Modification of Assumed-Immutable Data (MAID) 3
CWE-413 Improper Resource Locking 3
CWE-405 Asymmetric Resource Consumption (Amplification) 3
CWE-391 Unchecked Error Condition 3
CWE-390 Detection of Error Condition Without Action 3
CWE-329 Generation of Predictable IV with CBC Mode 3
CWE-324 Use of a Key Past its Expiration Date 3
CWE-322 Key Exchange without Entity Authentication 3
CWE-308 Use of Single-factor Authentication 3
CWE-299 Improper Check for Certificate Revocation 3
CWE-298 Improper Validation of Certificate Expiration 3
CWE-289 Authentication Bypass by Alternate Name 3
CWE-26 Path Traversal: '/dir/../filename' 3
CWE-242 Use of Inherently Dangerous Function 3
CWE-231 Improper Handling of Extra Values 3
CWE-229 Improper Handling of Values 3
CWE-226 Sensitive Information in Resource Not Removed Before Reuse 3
CWE-213 Exposure of Sensitive Information Due to Incompatible Policies 3
CWE-178 Improper Handling of Case Sensitivity 3
CWE-1423 Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution 3
CWE-1325 Improperly Controlled Sequential Memory Allocation 3
CWE-1281 Sequence of Processor Instructions Leads to Unexpected Behavior 3
CWE-1260 Improper Handling of Overlap Between Protected Memory Ranges 3
CWE-123 Write-what-where Condition 3
CWE-1189 Improper Isolation of Shared Resources on System-on-a-Chip (SoC) 3
CWE-118 Incorrect Access of Indexable Resource ('Range Error') 3
CWE-943 Improper Neutralization of Special Elements in Data Query Logic 2
CWE-939 Improper Authorization in Handler for Custom URL Scheme 2
CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel 2
CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes 2
CWE-87 Improper Neutralization of Alternate XSS Syntax 2
CWE-841 Improper Enforcement of Behavioral Workflow 2
CWE-834 Excessive Iteration 2
CWE-83 Improper Neutralization of Script in Attributes in a Web Page 2
CWE-804 Guessable CAPTCHA 2
CWE-791 Incomplete Filtering of Special Elements 2
CWE-780 Use of RSA Algorithm without OAEP 2
CWE-759 Use of a One-Way Hash without a Salt 2
CWE-705 Incorrect Control Flow Scoping 2
CWE-696 Incorrect Behavior Order 2
CWE-692 Incomplete Denylist to Cross-Site Scripting 2
CWE-656 Reliance on Security Through Obscurity 2
CWE-647 Use of Non-Canonical URL Paths for Authorization Decisions 2
CWE-646 Reliance on File Name or Extension of Externally-Supplied File 2
CWE-623 Unsafe ActiveX Control Marked Safe For Scripting 2
CWE-612 Improper Authorization of Index Containing Sensitive Information 2
CWE-547 Use of Hard-coded, Security-relevant Constants 2
CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') 2
CWE-430 Deployment of Wrong Handler 2
CWE-421 Race Condition During Access to Alternate Channel 2
CWE-414 Missing Lock Check 2
CWE-392 Missing Report of Error Condition 2
CWE-379 Creation of Temporary File in Directory with Insecure Permissions 2
CWE-377 Insecure Temporary File 2
CWE-356 Product UI does not Warn User of Unsafe Actions 2
CWE-341 Predictable from Observable State 2
CWE-315 Cleartext Storage of Sensitive Information in a Cookie 2
CWE-30 Path Traversal: '\dir\..\filename' 2
CWE-274 Improper Handling of Insufficient Privileges 2
CWE-271 Privilege Dropping / Lowering Errors 2
CWE-27 Path Traversal: 'dir/../../filename' 2
CWE-262 Not Using Password Aging 2
CWE-239 Failure to Handle Incomplete Element 2
CWE-230 Improper Handling of Missing Values 2
CWE-198 Use of Incorrect Byte Ordering 2
CWE-185 Incorrect Regular Expression 2
CWE-147 Improper Neutralization of Input Terminators 2
CWE-1328 Security Version Number Mutable to Older Versions 2
CWE-1327 Binding to an Unrestricted IP Address 2
CWE-1319 Improper Protection against Electromagnetic Fault Injection (EM-FI) 2
CWE-1295 Debug Messages Revealing Unnecessary Information 2
CWE-1257 Improper Access Control Applied to Mirrored or Aliased Memory Regions 2
CWE-1256 Improper Restriction of Software Interfaces to Hardware Features 2
CWE-1164 Irrelevant Code 2
CWE-1112 Incomplete Documentation of Program Execution 2
CWE-1100 Insufficient Isolation of System-Dependent Functions 2
CWE-941 Incorrectly Specified Destination in a Communication Channel 1
CWE-911 Improper Update of Reference Count 1
CWE-830 Inclusion of Web Functionality from an Untrusted Source 1
CWE-760 Use of a One-Way Hash with a Predictable Salt 1
CWE-758 Reliance on Undefined, Unspecified, or Implementation-Defined Behavior 1
CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') 1
CWE-689 Permission Race Condition During Resource Copy 1
CWE-670 Always-Incorrect Control Flow Implementation 1
CWE-657 Violation of Secure Design Principles 1
CWE-625 Permissive Regular Expression 1
CWE-592 DEPRECATED: Authentication Bypass Issues 1
CWE-564 SQL Injection: Hibernate 1
CWE-551 Incorrect Behavior Order: Authorization Before Parsing and Canonicalization 1
CWE-529 Exposure of Access Control List Files to an Unauthorized Control Sphere 1
CWE-499 Serializable Class Containing Sensitive Data 1
CWE-435 Improper Interaction Between Multiple Correctly-Behaving Entities 1
CWE-368 Context Switching Race Condition 1
CWE-366 Race Condition within a Thread 1
CWE-342 Predictable Exact Value from Previous Values 1
CWE-334 Small Space of Random Values 1
CWE-332 Insufficient Entropy in PRNG 1
CWE-313 Cleartext Storage in a File or on Disk 1
CWE-296 Improper Following of a Certificate's Chain of Trust 1
CWE-278 Insecure Preserved Inherited Permissions 1
CWE-214 Invocation of Process Using Visible Sensitive Information 1
CWE-148 Improper Neutralization of Input Leaders 1
CWE-1389 Incorrect Parsing of Numbers with Different Radices 1
CWE-1283 Mutable Attestation or Measurement Reporting Data 1
CWE-127 Buffer Under-read 1
CWE-1269 Product Released in Non-Release Configuration 1
CWE-1050 Excessive Platform Resource Consumption within a Loop 1
CWE-1047 Modules with Circular Dependencies 1