
We found results for “”
cloud_manager
Vendor: sysklogd_project
Number of Vulnerabilities per Q
Vulnerability Severity Distribution per CVSS v3
- Critical: NAN%
- High: NAN%
- Medium: NAN%
- Low: NAN%

Top CWE
CWE ID | Name | Link | Number of reported vulnerabilities |
---|---|---|---|
CWE-20 | Input Validation | http://cwe.mitre.org/data/definitions/20.html | 3 |
CWE-502 | Deserialization of Untrusted Data | http://cwe.mitre.org/data/definitions/502.html | 2 |
CWE-190 | Integer Overflow or Wraparound | http://cwe.mitre.org/data/definitions/190.html | 2 |
CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') | http://cwe.mitre.org/data/definitions/444.html | 1 |
CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') | http://cwe.mitre.org/data/definitions/400.html | 1 |
Top CWE
CWE-20
Input Validation
http://cwe.mitre.org/data/definitions/20.html
Number of reported vulnerabilities: 3
CWE-502
Deserialization of Untrusted Data
http://cwe.mitre.org/data/definitions/502.html
Number of reported vulnerabilities: 2
CWE-190
Integer Overflow or Wraparound
http://cwe.mitre.org/data/definitions/190.html
Number of reported vulnerabilities: 2
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
http://cwe.mitre.org/data/definitions/444.html
Number of reported vulnerabilities: 1
CWE-400
Uncontrolled Resource Consumption ('Resource Exhaustion')
http://cwe.mitre.org/data/definitions/400.html
Number of reported vulnerabilities: 1
Open source vulnerability database index: /vulnerability-database/projects-listing/