data.cwe.hashmap.serialized Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of dependency-check-core Show documentation
Show all versions of dependency-check-core Show documentation
dependency-check-core is the engine and reporting tool used to identify and report if there are any known, publicly disclosed vulnerabilities in the scanned project's dependencies. The engine extracts meta-data from the dependencies and uses this to do fuzzy key-word matching against the Common Platfrom Enumeration (CPE), if any CPE identifiers are found the associated Common Vulnerability and Exposure (CVE) entries are added to the generated report.
?? sr java.util.HashMap???`? F
loadFactorI thresholdxp?@ w ?t CWE-114t Process Controlt CWE-356t /Product UI does not Warn User of Unsafe Actionst CWE-598t 9Information Exposure Through Query Strings in GET Requestt CWE-115t Misinterpretation of Inputt CWE-357t /Insufficient UI Warning of Dangerous Operationst CWE-599t )Missing Validation of OpenSSL Certificatet CWE-116t 'Improper Encoding or Escaping of Outputt CWE-358t 2Improperly Implemented Security Check for Standardt CWE-117t 'Improper Output Neutralization for Logst CWE-359t 5Exposure of Private Information ('Privacy Violation')t CWE-118t 6Incorrect Access of Indexable Resource ('Range Error')t CWE-119t GImproper Restriction of Operations within the Bounds of a Memory Buffert CWE-590t Free of Memory not on the Heapt CWE-591t 2Sensitive Data Storage in Improperly Locked Memoryt CWE-350t AReliance on Reverse DNS Resolution for a Security-Critical Actiont CWE-351t Insufficient Type Distinctiont CWE-593t PAuthentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Createdt CWE-110t $Struts: Validator Without Form Fieldt CWE-352t !Cross-Site Request Forgery (CSRF)t CWE-594t 5J2EE Framework: Saving Unserializable Objects to Diskt CWE-111t Direct Use of Unsafe JNIt CWE-353t #Missing Support for Integrity Checkt CWE-595t :Comparison of Object References Instead of Object Contentst CWE-112t Missing XML Validationt CWE-354t ,Improper Validation of Integrity Check Valuet CWE-113t UImproper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')t CWE-597t *Use of Wrong Operator in String Comparisont CWE-355t User Interface Security Issuest CWE-125t Out-of-bounds Readt CWE-367t 1Time-of-check Time-of-use (TOCTOU) Race Conditiont CWE-126t Buffer Over-readt CWE-368t Context Switching Race Conditiont CWE-127t Buffer Under-readt CWE-369t Divide By Zerot CWE-128t Wrap-around Errort CWE-129t "Improper Validation of Array Indext CWE-360t Trust of System Event Datat CWE-361t 7PK - Time and Statet CWE-120t FBuffer Copy without Checking Size of Input ('Classic Buffer Overflow')t CWE-362t [Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')t CWE-121t Stack-based Buffer Overflowt CWE-363t &Race Condition Enabling Link Followingt CWE-122t Heap-based Buffer Overflowt CWE-364t Signal Handler Race Conditiont CWE-123t Write-what-where Conditiont CWE-365t Race Condition in Switcht CWE-124t &Buffer Underwrite ('Buffer Underflow')t CWE-366t Race Condition within a Threadt CWE-378t 4Creation of Temporary File With Insecure Permissionst CWE-136t Type Errorst CWE-379t BCreation of Temporary File in Directory with Incorrect Permissionst CWE-137t Representation Errorst CWE-138t +Improper Neutralization of Special Elementst CWE-370t