icon

We found results for “

wss4j

Vendor: linux


Number of Vulnerabilities per Q

Vulnerability Severity Distribution per CVSS v3

  • Critical
    : 0%
  • High
    : 100%
  • Medium
    : 0%
  • Low
    : 0%
vulnerabilities

Top CWE

CWE ID Name Link Number of reported vulnerabilities
CWE-327 Use of a Broken or Risky Cryptographic Algorithm http://cwe.mitre.org/data/definitions/327.html 2
CWE-264 Permissions, Privileges, and Access Control http://cwe.mitre.org/data/definitions/264.html 1
NVD-CWE-noinfo Insufficient Information 1
CWE-287 Authentication Issues http://cwe.mitre.org/data/definitions/287.html 1

Top CWE

CWE-327

Use of a Broken or Risky Cryptographic Algorithm

http://cwe.mitre.org/data/definitions/327.html

Number of reported vulnerabilities: 2

CWE-264

Permissions, Privileges, and Access Control

http://cwe.mitre.org/data/definitions/264.html

Number of reported vulnerabilities: 1

NVD-CWE-noinfo

Insufficient Information

Number of reported vulnerabilities: 1

CWE-287

Authentication Issues

http://cwe.mitre.org/data/definitions/287.html

Number of reported vulnerabilities: 1

Open source vulnerability database index: /vulnerability-database/projects-listing/