icon

We found results for “

jsish

Vendor: underbit


Number of Vulnerabilities per Q

Vulnerability Severity Distribution per CVSS v3

  • Critical
    : NAN%
  • High
    : NAN%
  • Medium
    : NAN%
  • Low
    : NAN%
vulnerabilities

Top CWE

CWE ID Name Link Number of reported vulnerabilities
CWE-416 Use After Free http://cwe.mitre.org/data/definitions/416.html 12
CWE-787 Out-of-bounds Write http://cwe.mitre.org/data/definitions/787.html 10
NVD-CWE-noinfo Insufficient Information 7
CWE-190 Integer Overflow or Wraparound http://cwe.mitre.org/data/definitions/190.html 2
2

Top CWE

CWE-416

Use After Free

http://cwe.mitre.org/data/definitions/416.html

Number of reported vulnerabilities: 12

CWE-787

Out-of-bounds Write

http://cwe.mitre.org/data/definitions/787.html

Number of reported vulnerabilities: 10

NVD-CWE-noinfo

Insufficient Information

Number of reported vulnerabilities: 7

CWE-190

Integer Overflow or Wraparound

http://cwe.mitre.org/data/definitions/190.html

Number of reported vulnerabilities: 2

Number of reported vulnerabilities: 2

Open source vulnerability database index: /vulnerability-database/projects-listing/