icon

We found results for “

shiro

Vendor: linux


Number of Vulnerabilities per Q

Vulnerability Severity Distribution per CVSS v3

  • Critical
    : 0%
  • High
    : 100%
  • Medium
    : 0%
  • Low
    : 0%
vulnerabilities

Top CWE

CWE ID Name Link Number of reported vulnerabilities
CWE-287 Authentication Issues http://cwe.mitre.org/data/definitions/287.html 4
CWE-284 Improper Access Control http://cwe.mitre.org/data/definitions/284.html 2
1
CWE-22 Path Traversal http://cwe.mitre.org/data/definitions/22.html 1
CWE-306 Missing Authentication for Critical Function http://cwe.mitre.org/data/definitions/306.html 1

Top CWE

CWE-287

Authentication Issues

http://cwe.mitre.org/data/definitions/287.html

Number of reported vulnerabilities: 4

CWE-284

Improper Access Control

http://cwe.mitre.org/data/definitions/284.html

Number of reported vulnerabilities: 2

Number of reported vulnerabilities: 1

CWE-22

Path Traversal

http://cwe.mitre.org/data/definitions/22.html

Number of reported vulnerabilities: 1

CWE-306

Missing Authentication for Critical Function

http://cwe.mitre.org/data/definitions/306.html

Number of reported vulnerabilities: 1

Open source vulnerability database index: /vulnerability-database/projects-listing/