CWE

Introduction

CWE(Common Weakness Enumeration) aims to provide a common base to identify the type of software weakness (vulnerability).. International in scope and free for public use, CWE™ provides a unified, measurable set of software weaknesses that will enable more effective discussion, description, selection, and use of software security tools and services that can find these weaknesses in source code. CWE gives a hierarchically structured list of weakness types to help identifying software vulnerabilities that come in a wide variety, such as SQL injection, cross-site scripting and buffer overflow. 

CWE Compatible Certification

Security Reviewer Suite is CWE Compatible Certified. We have achieved the final stage of MITRE's formal CWE Compatibility Program and are now "Officially CWE-Compatible." We are now eligible to use the CWE-Compatible Product/Service logo, and we completed and reviewed "CWE Compatibility Requirements Evaluation" questionnaires are posted here and on the Organizations Participating page as part of their product listings

CWE for Software Resilience Analysis

Security Reviewer SRA analyzes applications for discovering Security, Dead code and Best Practices vulnerabilities, both for Static Analysis and for Software Resilience Analysis.

Automated Source Code Reliability Measure

The quality measure elements (weaknesses violating software quality rules) that compose the Automated
Source Code Reliability Measure are presented in the following table.

This measure contains 35 parent weaknesses and 39 contributing weaknesses (children in the CWE) that represent variants of these weaknesses. The CWE
numbers for contributing weaknesses is presented in light blue cells immediately below the parent weakness
whose CWE number is in a dark blue cell.

For a complete list of covered CWE issues, see CISQ Riability Weakeness doc.

CWE for Security, Dead code and Best Practices Rules

Security Reviewer provides a consistent number of CWE 4.9 rules designed for detecting vulnerabilities inside source code. Each rule defines up to 12 variants and up to 50 API on which will applied, ande has its own CWE Identifier and Description, with related MITRE web site link, on which you can do a Search:

You can Export the rules list in Excel CSV format with CWE details:

CWE Ruleset

You can execute the Static Analysis with CWE ruleset:


CWE Results

After Static Analysis completion, even you chose a different RuleSet, each vulnerability detected has always its own CWE ID with the related web link:

 

You can list and export in Excel CSV all CWEs found during the Static Analysis:

In the Static Analysis Reports, each rule's violation shows the related clickable CWE™ ID:

CWE Capabilities

Requirement

Capability

Fulfillment Method

CWE
Searchability

Security, Dead code, Best practices Rules, Analysis Results and Reports

By using the search function in Security Reviewer, the vulnerability countermeasure information database, users are able to conduct a search using CWE identifiers as the keyword.

CWE
Output

Analysis Results

CWE identifiers are displayed in the “Results” section within each vulnerability countermeasure information pages.

Reports

CWE identifier is displayed in the “Violations” section of the detailed information window of each vulnerability countermeasure information.

CWE
Documentation

Security Reviewer Knowledge Center, User Guide

This material document will become the documentation necessary to describe and demonstrate CWE, CWE association and methods used to satisfy the compatibility requirements.

Mapping
Accuracy

Security, Dead code, Best practices Rules, Analysis Results and Reports

Security Reviewer supports many of CWE 4.4 IDs related to Static Analysis

Supported CWE per Programming Language (Tiobe Index Top 10)

CWE ID

Description

Language

Rule

Severity

111

Avoid invoking a native method

.NET

NativeNET

3

113

Header Checking Disabled

.NET

Header_Checking_Disabled

3

119

Array Index Out Of Bounds

.NET

C67VB

1

200

Deprecated use of Functions returning a Variant

.NET

DEPRECATED_VB_Variant

2

200

Avoid using of System.Console 'Write()' or 'WriteLine()' statements

.NET

Securitymisc07

3

200

Use of deprecated ActiveX/OCX components

.NET

DEPRECATED_VB

3

200

Deprecated type or function

.NET

deprecatedObjectVB

3

200

Deprecated Variable type

.NET

deprecatedVariableVB

3

200

Use of deprecated win32 API

.NET

DEPRECATED_API

3

200

Deprecated Win32 API returning ANY

.NET

DEPRECATED_API_ANY

3

209

Improper call of 'StackTrace' property of System.Exception

.NET

Securitymisc08

3

209

ASP.NET Misconfiguration (Impersonation)

.NET

ACIdentity

1

209

ASP.NET Misconfiguration (ViewStateMac Disabled)

.NET

ACStateMac

1

209

ASP.NET Misconfiguration (Header Checking Disabled)

.NET

ACHeaderChecking

1

212

public instance fields accessed by untrusted class

.NET

Idor06

4

212

public inner classes accessed from untrusted classes

.NET

Idor08

4

215

WCF Misconfiguration (Debug Information)

.NET

WCF_Debug_Information

3

248

Improper invoking of an exception filtering method

.NET

Securitymisc09

3

254

WCF Misconfiguration (Unsafe Revocation Mode)

.NET

WCF_Unsafe_Revocation_Mode

2

254

WCF Misconfiguration (Weak Token)

.NET

WCF_Weak_Token

2

257

Avoid recreating string from SecureString

.NET

Ftorurla01

2

257

Avoid using of String for password

.NET

Ics04

2

285

WCF Misconfiguration (Anonymous MSMQ)

.NET

WCF_Anonymous_MSMQ

1

327

Hardcoded connection strings

.NET

Itl02

3

327

Static Random Number Generator

.NET

Ics07VB

2

327

Static Random Number Generator

.NET

Ics07

2

327

Poor Seeding

.NET

PoorSeeding

2

327

Improper change of RSA/DSA KeySize property

.NET

Ics03

1

327

Hardcoded connection strings VB

.NET

Itl02VB

3

352

Unsecure local 'Cookie' object (XML)

.NET

cookieXML_NET

3

388

Ensure all exceptions are logged in the error blocks

.NET

Securitymisc03

2

388

Avoid using of 'throw' exceptions inside destructors

.NET

Securitymisc06

3

388

WCF Misconfiguration (Insufficient Audit Failure Handling)

.NET

WCF_Insufficient_Audit

3

388

Poor error handling

.NET

OnErrorVB

2

400

Denial of Service (Sleep)

.NET

C14VB

1

400

Denial of Service Threat

.NET

Injection23VB

1

404

Close DB connections in 'finally' block

.NET

Injection15

2

404

Unreleased Resource

.NET

Unreleased

1

404

Unreleased Resource

.NET

Injection14VB

1

404

Close DB objects in 'finally' block

.NET

Injection14

1

495

Static fields that are not readonly

.NET

Idor07

4

495

public instance fields accessed by untrusted classes

.NET

Idor02

3

497

Information Leakage (DDE)

.NET

VBDDE

3

497

LSET and RSET functions are deprecated fields not string

.NET

VBLRSET

3

511

Logic-Time Bomb (.NET)

.NET

TIMEBOMB_NET

2

532

Improper using of System.Console.Write() or WriteLine() in Catch blocks

.NET

Securitymisc05

2

581

Improper equality using hash codes

.NET

Ics01

1

639

System Error printed out

.NET

CE6VB

3

651

WCF Misconfiguration (Service Enumeration)

.NET

WCF_Service_Enumeration

3

665

Readonly Array fields should be cloned

.NET

Idor01

3

665

Improper 'virtual' declaration of a 'Clone()' method

.NET

Securitymisc11

3

667

Improrer locking of typed Objects

.NET

Idor10

3

671

Improper modification to security settings

.NET

Securitymisc15

4

676

Avoid using System Milliseconds

.NET

Securitymisc14

4

676

Setting Timer Interval to zero is deprecated

.NET

Securitymisc14VB

4

73

Setting Manipulation

.NET

Injection04SM

1

732

Improper deny of SkipVerification security permission

.NET

Ics02

1

77

[RunPE-Packed] Malware Suspicious behaviour

.NET

PEPacked

1

77

[RunPE] Malware Suspicious behaviour

.NET

PE

1

778

WCF Misconfiguration (Insufficient Logging)

.NET

WCF_Insufficient_Logging

3

78

Improper call to late-binding methods

.NET

Securitymisc10

3

79

Reflected XSS ASP-ASPX / Security Decisions Via Untrusted Inputs

.NET

Injection26

3

798

Avoid using of hardcoded string for password related parameters

.NET

Ics05

2

822

Exposing Pointer type fields

.NET

Idor03

2

822

Deprecated ObjPtr VarPtr StrPtr

.NET

idor03VB

2

829

Class outside namespace

.NET

Securitymisc02

2

863

Access Control: Database (VB)

.NET

accessControlVB

1

89

SQL Connection Injection

.NET

Injection11

1

111

Avoid user-defined Native methods (JSNI)

ALL

NativeJS

3

117

Log Forging

ALL

Injection19

1

15

External Control of System or Configuration Setting

ALL

ExternalSCS

2

190

Integer Overflow

ALL

IntegerOverflow

1

200

Deprecated DOS command

ALL

DeprecatedDOScommand

1

200

toString on Array

ALL

ArrayToString

1

200

Reflected Exposing of Sensitive data

ALL

Securitymisc17

3

209

Hardcoded credentials (JavaScript)

ALL

Hardcodedjs

1

213

Exposing of Sensitive data

ALL

Securitymisc01

1

22

Path Traversal

ALL

Injection05

1

242

Dangerous Function

ALL

deprecatedObjectFunction

1

311

Hardcoded credentials

ALL

HardcodedCredentials

1

326

Insecure algorithms for cryptography

ALL

Ics06

2

327

Weak Cryptography (JavaScript)

ALL

Cryptographic_JS

2

327

Weak Cryptography (SQL)

ALL

Cwe327SQL

2

327

Insecure TLS configuration

ALL

TLS_XML

2

328

Insecure TLS Cipher (Medium)

ALL

TLS_MEDIUM

3

328

Insecure SSL Cipher/Protocol

ALL

SSL

1

328

Insecure SSL Cipher (Medium)

ALL

SSL_MEDIUM

3

328

Insecure SSL configuration

ALL

SSL_XML

1

328

Weak TLS Cipher/Protocol

ALL

TLS

2

330

Use window.Crypto.getRandomValues()

ALL

Ics07JS

2

344

Hardcoded IP address

ALL

Itl03

1

349

JavaScript DB Injection

ALL

DBInjectionJS

1

352

Cross Site Request Forgery (JavaScript) - Missed datafilter

ALL

Csrfjs

2

352

HTTP Response Splitting

ALL

Csrf01

1

352

Cross Site Request Forgery (JavaScript)

ALL

Csrfjs_2

2

359

e-mail address in Source Code

ALL

EmailCode

3

36

Absolute Path in comment

ALL

Securitymisc19

4

36

Absolute path to a Shared Resource in source code

ALL

AbsoluteResource

3

36

Absolute Path in Source Code

ALL

Securitymisc18

3

388

Missing Custom Errors Page(s)

ALL

PageXML

3

388

Excessive Session Timeout

ALL

ExcessiveTimeOutXML

3

388

Avoid return break continue or throw in finally block

ALL

FinallyReturn

3

395

Denial of Service Threat - Resource consumption (CPU)

ALL

Sr_NullPointerException

1

400

Denial of Service (JavaScript)

ALL

DenialOfService_JS

1

434

Unrestricted Upload

ALL

InjectionUnrestricted

1

447

Unsupported Feature

ALL

UnsupportedIEW7

1

448

Deprecated Element

ALL

deprecatedBrowserIE

2

465

Second order Injection / Security Decisions Via Untrusted Inputs

ALL

Injection18

3

476

Null Pointer Deference (Nullable object)

ALL

NullableObject

1

476

Numeric method returns null

ALL

ReturnNumberNull

3

476

Null Pointer Deference (throw null)

ALL

NullableThrow

1

476

Null Pointer Deference (Nullable formal parameter)

ALL

NullableFormalParameter

1

476

Boolean Method returns null

ALL

NullableReturns

2

477

Statement is Deprecated (JavaScript)

ALL

deprecatedJS

3

478

switch/Select' statement should have a 'default'/'case else' condition

ALL

CWE200SC

4

494

Download of Code Without Integrity Check

ALL

Idor494

2

501

Cross-Session Contamination (JavaSCript)

ALL

CrossSessionContamination_JS

1

501

Trusted Bound Violation

ALL

Injection24

1

501

Trust Boundary Violation

ALL

Injection24_2

1

511

Logic-Time Bomb (DOS Command)

ALL

DangerousDOSCommand_BOMB

2

522

Password in Configuration file

ALL

Pcf

1

531

Unit Test Libraries  should be used in a separate source file

ALL

CWE395TEST_2

3

531

TestCase should be in a separate source file

ALL

CWE395TEST_1

2

564

SQL Injection (HibernateJS)

ALL

Injection564

1

601

HTTP Redirect

ALL

Csrf03

1

610

File or Directory Name Manipulation (JavaScript)

ALL

FileManipulation_JS

1

612

JavaScript IndexedDB Injection

ALL

IndexedDBInjectionJS

1

614

Insecure Cookie (JavaScript)

ALL

idorjs_unsecure_cookie

1

614

Cookie Session too long (JavaScript)

ALL

idorjs_cookie

2

614

Insecure Cookie

ALL

IdorCOOKIE

3

614

Insecure Cookie Path (JavaScript)

ALL

idorjs_unsecure_cookie_path

2

639

Avoid Debug/Trace mode in production

ALL

BrokenauthXML

5

642

Improper Granting of all privileges on an object

ALL

idorjs

1

664

Unsecure XML setting

ALL

IdorXML

3

668

Improper Logger (JavaScript)

ALL

Securitymisc12js

3

669

Avoid using Components NW.js

ALL

NWJS

1

669

Avoid using Components with Known Vulnerabilities  in POM-JAR  or Project File (Low)

ALL

Uckv08

3

669

Avoid using Components with Known Vulnerabilities  (Medium)

ALL

Uckv02

2

669

Avoid using Components with Known Vulnerabilities  in POM-JAR  or Project File (Medium)

ALL

Uckv07

2

669

Avoid using Components with Known Vulnerabilities  (Low)

ALL

Uckv03

3

669

Avoid using Components with Known Vulnerabilities  (High)

ALL

Uckv01

1

669

No Project Files were found

ALL

Uckv04

1

669

No POM.XML Files were found

ALL

Uckv05

1

669

Avoid using Components with Known Vulnerabilities  in POM-JAR  or Project File (High)

ALL

Uckv06

1

676

Dangerous DOS command

ALL

DangerousDOScommand

1

676

Missing wrapping of 'dangerous' functions

ALL

Securitymisc13

3

676

Dangerous Linux command

ALL

DangerousLinuxcommand

1

77

Code Injection - Tag

ALL

Injection01Tag

1

77

Command Injection

ALL

Injection01

1

78

OS Command Injection (JavaScript)

ALL

OSINJECTION_JS

1

79

Reflected XSS (JavaScript) / Security Decisions Via Untrusted Inputs

ALL

XSS_JS

3

79

Cross-Site Scripting (Web2py)

ALL

PYTHON_S60

1

79

Cross Site Scripting / Security Decisions Via Untrusted Inputs

ALL

Xss01

1

798

User-Password-Profile-ID in Comment

ALL

Uohcc01

4

798

Hardcoded IP address in comment

ALL

Itl04

4

798

Suspicious  Hardcoded  URL/URI

ALL

Dangerous_Hardcoded_URL

3

863

Access Control: Database (JavaScript)

ALL

accessControl_JS

1

88

Avoid SELECT * statements

ALL

Injection17

3

88

NET injection

ALL

Injection20

1

89

SQL Query Injection

ALL

Injection10

1

90

LDAP Injection

ALL

Injection07

1

90

Possible LDAP Injection

ALL

InjectionCert

3

91

Weak XML Schema (tag Any)

ALL

XSDAny

3

91

Weak XML Schema (type Unbounded)

ALL

XSDmaxOccurs

3

91

XPath Injection

ALL

Injection13

1

91

Weak XML Schema (Lax-Skip tags)

ALL

LaxSkip

1

94

CORS - Overly permissive target origin

ALL

CodeInjection_JS3

1

94

JQuery Code Injection (JavaScript)

ALL

jqueryjs

1

94

Second Order Code Injection (JavaScript)

ALL

MooToolsjs

1

94

Overly permissive target origin

ALL

CodeInjection_JS2

1

94

HTML Injection (JavaScript)

ALL

HTMLInjectionJS

1

94

Code Injection (JavaScript)

ALL

CodeInjection_JS

1

94

Second Order File Injection (JavaScript)

ALL

MooToolsFilejs

1

94

Second Order Unsecure JSON decoding (JavaScript)

ALL

MooToolsJsonjs

1

95

Eval Injection (JavaScript)

ALL

EvalInjection

1

96

SQL Injection (JavaScript)

ALL

SQL_Injection_JS

1

97

Server Side Include (SSI) Injection

ALL

SSI

1

99

Resource Injection (JavaScript)

ALL

ResourceInjection_JS

1

119

Array Index Out Of Bounds

CCPP

C67

1

119

Buffer Overflow (Containers)

CCPP

C03

1

120

Second order Buffer Overflow (sizeof of sizeof)

CCPP

C46

3

120

Buffer Overflow (Buffer)

CCPP

C08

1

120

Buffer Overflow (Array pointer)

CCPP

C04

1

120

Memory Leak (ctype isalnum|isalpha|isascii|is..)

CCPP

C35

2

120

Buffer Overflow (Array Index)

CCPP

C02

2

121

scanf without field width limits

CCPP

C86

3

122

Buffer Overflow (strncpy/memset/memcpy)

CCPP

C10

1

125

Buffer Access Out Of Bounds

CCPP

C68

1

125

Buffer Overflow (Array)

CCPP

C07

1

125

Second order Buffer Overflow (Array)

CCPP

C49

3

126

Second order Buffer Overflow (strncpy)

CCPP

C50

2

126

Buffer Overlap (s[n]printf())

CCPP

C11

2

129

Buffer Overflow (Index is out of range)

CCPP

C06

1

131

Avoid using of Unitialized Variable (Wrong buffer write)

CCPP

C62

1

134

sprintf: insufficient format string parameters

CCPP

C87

3

134

Stack Overflow (scanf)

CCPP

C81

3

135

Incorrect Calculation of Multi-Byte String Length

CCPP

C135

3

170

Buffer Not Zero Terminated (After a call to a function)

CCPP

C70

1

190

Buffer Overflow (strncat)

CCPP

C09

1

195

Stack Overflow (printf sint)

CCPP

C79

3

196

Stack Overflow (printf uint)

CCPP

C80

3

20

Memory Leak (Same iterator)

CCPP

C24

2

200

Information Leakage (#pragma ibm critical)

CCPP

CE11

3

214

Information Leakage (#pragma ibm parallel_loop)

CCPP

CE12

3

233

Invalid Length Modifier (printf)

CCPP

C73

3

243

Creation of chroot Jail Without Changing Working Directory

CCPP

CE243

1

256

Plaintext Storage of a Password

CCPP

CE256

2

257

Avoid using of String for password

CCPP

CE7

2

311

Memory Leak (Unsafe root Class)

CCPP

C29

2

327

Cryptographic key too short

CCPP

CE8

3

344

Hardcoded IP address

CCPP

CE9

1

369

Division by zero

CCPP

C15

1

369

Potential division by zero

CCPP

C42

2

388

Invalid c_str() after a call

CCPP

C20

2

388

Invalid c_str() after throwing exception

CCPP

C21

2

396

Improper Logger (Rethrow)

CCPP

C41

1

398

Memory Leak (Missing virtual destructor)

CCPP

C34

2

399

Memory Leak (Class provides constructors)

CCPP

C27

2

400

Denial of Service (usleep)

CCPP

C14

1

401

Memory Leak (Copy 'auto_ptr' pointer)

CCPP

C33

2

401

Memory Leak (when executing)

CCPP

C39

1

404

Resource Leak (when executing)

CCPP

C40

1

456

Avoid using of Unitialized Variable (Leak)

CCPP

C60

1

457

Avoid using of Unitialized Variable (Member Variable)

CCPP

C59

1

457

Memory Leak (Data not initialized)

CCPP

C28

2

466

Stack Overflow (Wrong returning reference)

CCPP

C57

2

467

Buffer Overflow (pointer)

CCPP

C01

1

467

Second order Buffer Overflow (sizeof for Array)

CCPP

C48

3

468

Stack Overflow (printf *)

CCPP

C77

3

476

Second order null Pointer Dereference (null Pointer)

CCPP

C51

2

476

Second order null Pointer Dereference (shifting negative)

CCPP

C53

2

476

Memory Leak (New)

CCPP

C37

1

477

Obsolete Functions

CCPP

C32

3

480

Assign Bool To Pointer (converting bool value to address)

CCPP

C69

3

487

Invalid Scope Object ('auto-ptr' pointer)

CCPP

C23

1

495

Stack Overflow (local Array variable)

CCPP

C56

2

497

Information Leakage (#pragma ibm schedule)

CCPP

CE13

3

511

Logic-Time Bomb (C/C++)

CCPP

TIMEBOMB_C

2

523

Avoid using of non-SSL communications

CCPP

CE4

2

531

Unit Test Libraries  should be used in a separate source file

CCPP

CWE395TEST_2_CPP

3

532

Improper Logger (Destructor)

CCPP

C30

1

534

Ensure all exceptions are either logged with a standard logger or rethrow

CCPP

C31

2

562

Stack Overflow (auto-variable)

CCPP

C55

2

562

Stack Overflow (temporary)

CCPP

C58

2

569

Memory Leak (Class contains a std::string)

CCPP

C26

2

569

Second order Buffer Overflow (strlen/sizeof)

CCPP

C44

3

569

Second order Buffer Overflow (sizeof)

CCPP

C45

3

590

Memory Leak (Memory allocated not freed)

CCPP

C25

2

617

Call Settings manipulation (Assert)

CCPP

C12

3

628

Stack Overflow (printf char*)

CCPP

C78

3

628

Call Settings manipulation (pipe())

CCPP

C13

2

639

System Error stored in a variable

CCPP

CE6_S

4

639

System Error printed out

CCPP

CE6

3

665

Avoid using of Unitialized Variable (inside constructor)

CCPP

C65

1

665

Second order null Pointer Dereference (passing NULL)

CCPP

C52

2

665

Avoid using of Unitialized Variable (Missing use of constructor)

CCPP

C66

1

665

Avoid using of Unitialized Variable (Wrong reassignement)

CCPP

C61

3

665

Invalid Scope Object

CCPP

C22

1

665

Avoid using of Unitialized Variable

CCPP

C63

1

665

Avoid using of Unitialized Variable (struct)

CCPP

C64

1

676

Stack Overflow (Pure virtual call)

CCPP

C54

1

680

Buffer Overflow (operator)

CCPP

C05

1

681

Invalid printf argument type (floating point)

CCPP

C74

3

681

Stack Overflow (printf int)

CCPP

C75

3

686

Stack Overflow (printf int*)

CCPP

C76

3

695

Improper usage of I/O Stream

CCPP

C16

2

695

Avoid using of I/O Stream (Read)

CCPP

C17

2

695

Avoid using of I/O Stream

CCPP

C18

2

695

Avoid using of I/O Stream (Write)

CCPP

C19

2

762

Memory Leak (New mismatch)

CCPP

C38

3

763

Portability failure (CastIntegerToAddressAtReturn)

CCPP

C85

1

763

Portability failure (AssignmentIntegerToAddress)

CCPP

C83

1

78

OS command Injection (Unvalidated command string)

CCPP

CE5

1

783

Second order Buffer Overflow (sizeof with a numeric constant)

CCPP

C47

3

79

Cross Site Scripting / Security Decisions Via Untrusted Inputs

CCPP

CE2

1

79

Reflected Cross Site Scripting / Security Decisions Via Untrusted Inputs

CCPP

C43

2

825

Memory Leak (deallocated pointer)

CCPP

C36

1

86

OS command Injection (Buffer overrun)

CCPP

C82

2

86

Portability failure (AssignmentAddressToInteger)

CCPP

C82

1

86

Portability failure (CastAddressToIntegerAtReturn)

CCPP

C84

1

88

NET injection

CCPP

CE3

1

89

SQL Query Injection

CCPP

CE1

1

113

HTTP Response Splitting

COBOL

Cwe113

1

117

COBOL LOG Forging

COBOL

Cwe117

1

15

CALL Settings Manipulation

COBOL

Cwe15

2

200

Information Leakage - ACCEPT ... FROM CONSOLE

COBOL

Cwe200P3

3

200

Information Leakage - DUMPCODE

COBOL

Cwe200

3

200

Information Leakage - DISPLAY

COBOL

Cwe200P1

3

200

Information Leakage - EVALUATE

COBOL

Cwe200P2

4

307

Access Control: MQ

COBOL

Cwe307

1

327

Weak Cryptography 

COBOL

Cwe327

2

359

Privacy Violation : Hardened Credentials 

COBOL

Cwe359

2

388

Include SQLCA MISSED

COBOL

Cwe388P2

2

388

Ignored Error Condition

COBOL

Cwe388

3

388

Multiple HANDLE ABEND

COBOL

Cwe388P1

4

457

Avoid using of Unitialized Variable

COBOL

Cwe457

3

546

Suspicious Comment

COBOL

Cwe546

4

610

URL Redirection to Untrusted Site

COBOL

Cwe610

1

692

Reflected Cross Site Scripting / Security Decisions Via Untrusted Inputs

COBOL

Cwe692

2

692

Stored Cross Site Scripting / Security Decisions Via Untrusted Inputs

COBOL

Cwe692P1

1

692

UTF-7 Cross-Site Scripting (COBOL)

COBOL

Cwe692P2

3

73

FILE Path Manipulation

COBOL

Cwe73

2

78

OS Command Injection

COBOL

Cwe78

1

79

Cross-site Scripting

COBOL

Cwe79

1

798

Password in Comment

COBOL

Cwe798P2

4

798

Password Stored in plain text

COBOL

Cwe798

2

798

Hardcoded Password

COBOL

Cwe798P1

2

863

Access Control: DLI

COBOL

Cwe863

1

89

Access Control: Database

COBOL

Cwe89

1

99

QUEUE Resource Injection

COBOL

Cwe732

1

11

Flex Misconfiguration (Debug Information)

JAVA

XML_Debug_Information

2

114

Library injection

JAVA

Injection08

1

16

Build misconfiguration (Dynamic Dependency)

JAVA

Dynamic_Dependency

3

16

Build Misconfiguration (External Maven Dependency Repository)

JAVA

External_Maven_Dependency_Repository

4

16

Build Misconfiguration (External Ant Dependency Repository)

JAVA

External_Ant_Dependency_Repository

4

20

ADF Bad Practice (Unsecure Attribute)

JAVA

ADF_Unsecure_Attribute

2

20

ADF Bad Practice (url-invoke)

JAVA

ADF_url_invoke

2

20

addAccount vulnerability (CVE-2014-8609)

JAVA

addAccount

1

20

ADF Bad Practice (Missing Converter)

JAVA

ADF_Missing_Converter

2

200

Deprecated Functions

JAVA

DEPRECATED_1

3

200

Improper using of System.err.println() in Catch blocks

JAVA

Securitymisc04

2

200

Avoid use of com.sun or sun packages

JAVA

DEPRECATED_2

3

200

System information leak- Direct JSP Access

JAVA

LeakXML

1

200

Information Exposure - HTML comment in JSP

JAVA

CommentHTML

5

209

Debug statements can be leaked

JAVA

Brokenauth04

5

209

Debug level of 3 or greater could cause sensitive data including passwords to be logged. Debug #[Object]

JAVA

DebugXML

3

209

HTTP Verb Tampering

JAVA

TamperingXML

1

213

Unecessary temporaries when using toString()

JAVA

UnecessarytoString

1

246

JAVA Bad Practices: Direct Use of Sockets

JAVA

use_of_Sockets

1

254

WebSphere Misconfiguration (Missing Outbound Timestamp)

JAVA

WSP_Missing_Outbound_Timestamp

3

254

WebSphere Misconfiguration (Missing Inbound Timestamp)

JAVA

WSP_Missing_Inbound_Timestamp

3

254

Weblogic Misconfiguration (Missing Timestamp)

JAVA

Weblogic_Missing_Timestamp

3

254

WWS-Security Misconfiguration (Weak Token)

JAVA

WWS_Weak_Token

2

257

Avoid recreating string from GuardedString

JAVA

Ftorurla01Java

2

257

Avoid using of String for password

JAVA

jcs04

2

311

WebSphere Misconfiguration (Weak Token)

JAVA

WSP_Weak_Token

3

327

Missing transport-guarantee Constraint

JAVA

GuaranteeXML

1

327

Cipher.getInstance with ECB

JAVA

GetInstance_lint

3

327

Cryptographic key too short

JAVA

Ics08

3

330

Weak pseudo-random numbers

JAVA

Ics07Java

2

330

Weak RNG

JAVA

TrulyRandom_lint

3

330

Using a fixed seed with SecureRandom

JAVA

SecureRandom_lint

3

345

WebSphere Misconfiguration (Missing Outbound WS-Security)

JAVA

WSP_Missing_Outbound_WS_Security

3

345

WebSphere Misconfiguration (Servlets)

JAVA

WSP_Servlets

3

345

WebSphere Misconfiguration (Missing Inbound WS-Security)

JAVA

WSP_Missing_Inbound

3

345

WebSphere Misconfiguration (Missing Inbound Encryption)

JAVA

WSP_Missing_Inbound_Encryption

3

345

WebSphere Misconfiguration (Missing Outbound Signature)

JAVA

WSP_Missing_Outbound_Signature

3

345

WebSphere Misconfiguration (Missing Outbound Encryption)

JAVA

WSP_Missing_Outbound_Encryption

3

345

WebSphere Misconfiguration (Missing Inbound Signature)

JAVA

WSP_Missing_Inbound_Signature

3

345

WebSphere Misconfiguration (Missing Timestamp Expiration)

JAVA

WSP_Missing_Timestamp_Expiration

3

352

Unsecure local 'Cookie' object

JAVA

Brokenauth03

3

352

Avoid using of 'get' for credential transfers

JAVA

Csrf02

2

372

Incorrect Static Field Access

JAVA

StateDistinction

3

382

JAVA Bad Practice - System.exit()

JAVA

USE_SYSTEM_EXIT

1

388

Throw in main() method

JAVA

ThrowInMain

3

388

Ensure all exceptions are either logged with a standard logger or rethrow

JAVA

Securitymisc12

3

388

Unsecure tracking.mode

JAVA

TrackingXML

3

394

Host Name or Address in a condition

JAVA

SecurityBreach

2

400

Denial of Service Threat

JAVA

Injection23

1

404

Memory Leak (ObjectOutputStream)

JAVA

MemoryLeakObjectOutputStream

4

404

Missing call to super

JAVA

MissingCallSuper

2

470

Reflection injection

JAVA

Injection09

1

471

Immutable Classes: Non-final Fields

JAVA

ImmutableClass

3

476

Null Pointer Deference (sinchronized)

JAVA

NullableSinchronized

1

476

Null Pointer Deference (condition)

JAVA

NullableCondition

1

476

Empty arrays and collections should be returned instead of null

JAVA

ReturnEmptyArrays

2

477

Unsupported Feature

JAVA

UnsupportedFeatureJS

2

499

Incorrect Serializable Method Signature

JAVA

IncorrectSerializable

3

499

Incorrect Serialization of inner classes

JAVA

InnerClassSerializable

4

5

ACEGI Security Bad Practice (Insecure Channel Mixing)

JAVA

ACEGI_Insecure_Channel_Mixing

2

506

JAVA Bad Practice - Dangerous access to local resources

JAVA

writePathName

1

511

Logic-Time Bomb (JavaScript)

JAVA

TIMEBOMB_JS

2

511

Logic-Time Bomb

JAVA

TIMEBOMB_JAVA

2

522

Weak LDAP Authentication (Anonymous)

JAVA

SECURITY_AUTHENTICATION

2

523

Insecure SSL Connection

JAVA

InsecureSSLconnection

2

523

Titanium Broken default HTTPS

JAVA

NonValidatingTrustManager

2

523

Avoid using of non-SSL communications

JAVA

Itl01

2

532

Improper call to printStackTrace() method of Throwable objects

JAVA

Securitymisc16

5

572

Denial Of Service (Thread)

JAVA

ThreadRUN

2

573

Bean Class should be serialized

JAVA

NonSerializableBean

3

594

Missing writeObject or serialVersionUID

JAVA

ClassSerializable

3

639

Custom Security Manager outside of 'main'

JAVA

Brokenauth01

2

662

Denial Of Service (Synchronization)

JAVA

Notify

2

668

Exposing dangerous data

JAVA

Ftorurla02

2

693

Missing 'SecurityManager' checks

JAVA

Idor09

4

693

Missing security manager

JAVA

Idor11

3

693

Custom 'SecurityManager'

JAVA

Idor05

3

708

ACEGI Security Bad Practice (Run-As)

JAVA

ACEGI_Run_As

2

73

File Contents Injection

JAVA

Injection04

1

73

Empty Jar o Zip file creation

JAVA

EmptyJarZip

2

73

File Inclusion Vulnerability

JAVA

IncludeFile

2

732

Bean class should be public

JAVA

BeanClassPublic

2

732

Bean class without ejbCreate() method

JAVA

BeanClassejbCreate

2

732

Bean class should not have finalize() method

JAVA

BeanClassFinalize

2

732

Abstract Bean class

JAVA

AbstractBeanClass

2

732

Uncorrect declaring of ejbCreate() method

JAVA

UncorrectDeclaring

2

732

Uncorrect declaring of ejbCreate() method

JAVA

UncorrectDdeclaring

2

732

Final Bean class

JAVA

FinalBeanClass

2

732

Bean class shloud not return 'this'

JAVA

BeanClassThis

2

77

Malicious package name was found

JAVA

MaliciousPackage

1

78

Environment Variable Injection

JAVA

Injection03

1

79

Second order reflected XSS / Security Decisions Via Untrusted Inputs

JAVA

Injection99

2

79

Stored XSS

JAVA

JSPStored

1

79

Reflected XSS / Security Decisions Via Untrusted Inputs

JAVA

Injection25

2

798

Autocompleted password fields

JAVA

Brokenauth02

2

798

Password stored in plaintext (JAVA)

JAVA

PasswordStored

2

798

Dangerous Hardcoded TCP Port

JAVA

Itl03Port

1

813

Exposing of internal representations by returning mutable fields

JAVA

Idor04

3

829

Avoid user-defined Native methods

JAVA

NativeJava

2

88

Attribute injection

JAVA

Injection22

1

88

Unsecure Properties setting

JAVA

UnsecurePropertiesSetting

2

89

Second order SQL Injection

JAVA

Injection16

3

89

Jakarta Digester Injection

JAVA

Injection02

1

89

Second Order SQL Injection - Primary Key

JAVA

Injection10Key

3

91

XML Injection

JAVA

Injection12

1

91

XXE - XML External Entities

JAVA

XMLExternalEntities

1

91

XXE - XML External Entity Injection

JAVA

InjectionXXE

1

91

JXPath Injection

JAVA

Injection06

1

94

addJavascriptInterface Called

JAVA

AddJavascriptInterface_lint

3

94

Code injection

JAVA

Injection21

1

94

Code Injection-Insecure loading of a JAVA Class or a Child Process

JAVA

createPackageContext

1

117

User-Passwords logging

PHP

PHP.26

1

117

Unsanitized Data Written to Logs

PHP

PHP.27

3

16

Failure to use 'disable_functions'

PHP

PHP.16

4

200

Information Leakage ($_GET['test'])

PHP

PHP.14

3

200

Improper Use of 'register_globals'

PHP

PHP.38

1

200

Improper Use of 'register_globals'

PHP

PHP.31

3

200

Information Leakage through Deprecated Functions

PHP

PHP.13

3

200

Information Exposure Through an Error Message (phpinfo)

PHP

PHP.12

3

257

Avoid Hardcoded Passwords

PHP

PHP.17

1

261

Unsafe Password Management

PHP

PHP.28

1

284

File Access Vulnerability

PHP

PHP.23

2

284

Package Running Under Potentially Excessive Permissions (AUTHID DEFINER)

PHP

PHP.46

4

327

Insecure pseudo-random number generation(mt_rand)

PHP

PHP.15

3

338

Deterministic Pseudo-Random Values (openssl_random_pseudo_bytes)

PHP

PHP.36

3

338

Deterministic Pseudo-Random Values ('secure' value deliberately set to 'false')

PHP

PHP.35

3

434

Unsafe Processing of $_FILES Array

PHP

PHP.25

3

601

Indiscriminate Merging of Input Variables

PHP

PHP.40

2

79

Potential DOM-Based XSS / Security Decisions Via Untrusted Inputs

PHP

PHP.42

2

79

Stored XSS

PHP

PHP.45

3

79

Potential XSS (user-supplied) / Security Decisions Via Untrusted Inputs

PHP

PHP.41

2

812

Log in to MySQL as 'root'

PHP

PHP.34

1

812

De-Activation of 'safe_mode'

PHP

PHP.32

3

88

Function allowing execution of commands coming (proc_open)

PHP

PHP.06

1

88

Function allowing execution of commands coming (pcntl_exec)

PHP

PHP.07

1

88

Function allowing execution of commands (exec)

PHP

PHP.03

1

88

Function allowing execution of commands (system)

PHP

PHP.02

1

88

Function allowing execution of commands (shell_exec)

PHP

PHP.01

1

88

Function allowing execution of commands (passthru)

PHP

PHP.05

1

88

Function allowing execution of commands (popen)

PHP

PHP.04

1

88

Application Variable Used on System Command Line

PHP

PHP.19

1

88

User Controlled Variable Used on System Command Line

PHP

PHP.18

2

89

Potential SQL Injection (pre-prepared dynamic SQL)

PHP

PHP.43

1

89

Potential SQL Injection (dynamic SQL)

PHP

PHP.44

1

94

User's input contains code syntax  (preg_replace)

PHP

PHP.10

1

94

User's input contains code syntax (eval)

PHP

PHP.08

1

94

User's input contains code syntax  (assert)

PHP

PHP.09

1

94

User's input contains code syntax (create_function)

PHP

PHP.11

1

94

De-Activation of 'magic_quotes'

PHP

PHP.33

2

94

Function May Evaluate PHP Code Contained in User Controlled Variable

PHP

PHP.29

2

98

Variable Used as FileName

PHP

PHP.24

5

98

File Inclusion Vulnerability

PHP

PHP.20

2

98

Variable Used as FileName

PHP

PHP.21

1

98

File Inclusion Vulnerability (uncompiled)

PHP

PHP.22

2

113

Header Manipulation - Cookies (Python)

PYTHON

PYTHON_S14

2

117

Log Forging (Python)

PYTHON

PYTHON_S16

1

15

Setting Manipulation (Python)

PYTHON

PYTHON_S23

2

20

Memcached Injection

PYTHON

PYTHON_S17

2

200

Suspicious long-term packet sniffing

PYTHON

PYTHON_S57

3

200

Suspicious multi-port Sniffing

PYTHON

PYTHON_S66

3

200

System Information Leak - External (Python)

PYTHON

PYTHON_S05

4

22

Path Traversal (Python)

PYTHON

PYTHON_S39

1

23

Relative Path Traversal (Python)

PYTHON

PYTHON_S76

3

246

Suspicious Socket/Scapy packets send

PYTHON

PYTHON_S51

1

256

Password in connection string

PYTHON

PYTHON_S34

1

261

Weak Cryptography (Python)

PYTHON

PYTHON_S36

2

314

Command Injection

PYTHON

PYTHON_S47

2

321

Empty or Null Encryption Key

PYTHON

PYTHON_S31

2

321

Empty HMAC Key

PYTHON

PYTHON_S32

2

321

Empty PBE Password

PYTHON

PYTHON_S33

2

327

Weak Cryptography (Python)

PYTHON

PYTHON_S70

2

330

Insecure Randomness - Hardcoded Seed

PYTHON

PYTHON_S30

2

330

Insecure Randomness (Python)

PYTHON

PYTHON_S29

2

340

Predictable Resource Name

PYTHON

PYTHON_S08

1

359

Privacy Violation : Hardened Credentials 

PYTHON

PYTHON_S45

2

387

Information Leakage-Signal (Python)

PYTHON

PYTHON_S50

2

387

Information leakage-Keyboard (Python)

PYTHON

PYTHON_S49

2

388

Improper print of sensitive information during exception handling

PYTHON

PYTHON_S74

3

388

Improper masking of exceptions (Python)

PYTHON

PYTHON_S52

3

388

Unsecure Callback function (Django-hotsauce)

PYTHON

PYTHON_S62

3

388

Poor Exception Handling (Python)

PYTHON

PYTHON_S68

3

400

Denial of Service (Sleep)

PYTHON

PYTHON_S53

1

434

Unrestricted Upload (Django)

PYTHON

PYTHON_S02

1

477

Obsolete Python Framework

PYTHON

PYTHON_S67

3

494

Unsafe Pickle Deserialization

PYTHON

PYTHON_S13

3

494

Reflection Injection (Python)

PYTHON

PYTHON_S41

2

497

System Information Leak - Internal (Python)

PYTHON

PYTHON_S06

1

501

Trust Boundary Violation (Python)

PYTHON

PYTHON_S07

1

522

Unsecure URL/URI in a condition (Python)

PYTHON

PYTHON_S75

3

531

Assert code found (Python)

PYTHON

PYTHON_S43

2

531

Test code found in production (Python)

PYTHON

PYTHON_S42

2

539

Unsecure Cookie (Python)

PYTHON

PYTHON_S27

2

539

Unsecure Cookie - HTTPOnly not Set (Python)

PYTHON

PYTHON_S28

2

552

File Disclusure (Django)

PYTHON

PYTHON_S01

1

601

Open Redirect (Python)

PYTHON

PYTHON_S18

1

610

File or Directory Name Manipulation (Python)

PYTHON

PYTHON_S46

1

631

XSLT Injection (Python)

PYTHON

PYTHON_S26

1

643

XPath Injection (Python)

PYTHON

PYTHON_S24

1

692

Blacklisted Attributes (Django)

PYTHON

PYTHON_S03

3

73

Path Manipulation (Python)

PYTHON

PYTHON_S19

2

77

Command Injection (Python)

PYTHON

PYTHON_S10

1

78

Suspicious user input (OS Prompt)

PYTHON

PYTHON_S56

1

78

Suspicious Win32 usage (SID)

PYTHON

PYTHON_S71

1

78

Suspicious Win32 usage (Win32Security)

PYTHON

PYTHON_S72

1

78

Environment Variable Injection

PYTHON

PYTHON_S73

1

78

OS Command Injection (Python)

PYTHON

PYTHON_S44

1

78

Suspicious Win32 usage (Console Window)

PYTHON

PYTHON_S48

1

79

Cross-Site Scripting (Web2py)

PYTHON

PYTHON_S64

1

79

Cross-Site Scripting (Python)

PYTHON

PYTHON_S63

1

79

Stored XSS (Python)

PYTHON

PYTHON_S11

2

79

ReDoS In Replace

PYTHON

PYTHON_S40

1

798

Dangerous Hardcoded TCP Port

PYTHON

PYTHON_S65

1

798

Hardcoded Password (Python)

PYTHON

PYTHON_S35

1

88

Suspicious DNS Dynamic Update

PYTHON

PYTHON_S55

1

88

Direct use of Sockets (Python)

PYTHON

PYTHON_S58

1

88

Suspicious DNS Transfer

PYTHON

PYTHON_S54

1

89

SQL Injection (Web2py)

PYTHON

PYTHON_S59

1

89

Possible SQL Injection (cubicweb)

PYTHON

PYTHON_S61

1

89

SQL Injection (Python)

PYTHON

PYTHON_S21

1

91

XML Injection (Python)

PYTHON

PYTHON_S25

1

918

Server-Side Request Forgery

PYTHON

PYTHON_S22

1

93

Mail Content Injection

PYTHON

PYTHON_S15

1

94

Overly Permissive CORS Policy (Python)

PYTHON

PYTHON_S04

1

94

Code Injection (Python)

PYTHON

PYTHON_S12

1

99

Resource Injection (Python)

PYTHON

PYTHON_S20

1

117

Information disclosure (detailed exceptions)

RUBY

INJECTION_RUBY_62.1

1

117

Information disclosure

RUBY

INJECTION_RUBY_61.1

1

117

Information disclosure (detailed exceptions)

RUBY

INJECTION_RUBY_62.2

2

117

Second order Information disclosure

RUBY

INJECTION_RUBY_61.2

2

200

Default Routes

RUBY

IMP_RUBY_12.1

1

200

Default Routes

RUBY

IMP_RUBY_12.2

2

209

Hardcoded credentials (CVE-2013-0333)

RUBY

BROKEN_RUBY_9.0

3

212

'serialize' vulnerability (CVE-2013-0277)

RUBY

INSECURE_RUBY_50.1

1

212

Unsafe deserialization

RUBY

INSECURE_RUBY_25.2

2

212

'serialize' vulnerability (CVE-2013-0277)

RUBY

INSECURE_RUBY_50.2

2

269

Unsafe instances

RUBY

FAILURE_RUBY_70.2

2

269

Unsecure mass assignment

RUBY

FAILURE_RUBY_17.2

2

269

Unsecure mass assignment

RUBY

FAILURE_RUBY_54.2

2

269

Dangerous attributes in Model

RUBY

IMP_RUBY_60.1

1

269

Nested attributes in Rails 2.3.9 and 3.0.0 (CVE-2010-3933)

RUBY

FAILURE_RUBY_31.1

1

269

Unsecure mass assignment

RUBY

FAILURE_RUBY_17.1

1

269

Unsecure mass assignment

RUBY

FAILURE_RUBY_54.1

1

269

Dangerous attributes in Model

RUBY

IMP_RUBY_60.2

2

269

Improper Session key length

RUBY

FAILURE_RUBY_26.1

1

269

Unsafe instances

RUBY

FAILURE_RUBY_70.1

1

269

Unsecure mass assignment

RUBY

FAILURE_RUBY_17.3

3

269

Dangerous attributes in Model

RUBY

IMP_RUBY_60.3

3

269

Unsafe instances

RUBY

FAILURE_RUBY_70.3

3

352

CSRF or authentication checks wrongly skipping

RUBY

CSRF_RUBY_10.2

2

352

'protect_from_forgery' not enabled in ApplicationController (csrf_protection_missing)

RUBY

CSRF_RUBY_7.1

1

352

Response splitting (CVE-2011-3186)

RUBY

CSRF_RUBY_37.2

2

352

Verifies that protect_from_forgery is enabled in ApplicationController (CVE-2011-0447)

RUBY

CSRF_RUBY_33.1

1

352

CSRF or authentication checks wrongly skipping

RUBY

CSRF_RUBY_8.2

2

352

Verifies that protect_from_forgery is enabled in ApplicationController (csrf_protection_disabled)

RUBY

CSRF_RUBY_6.1

1

400

Header DoS (CVE-2011-2930)

RUBY

INJECTION_RUBY_35.1

1

400

Render :text DoS (CVE_2014_0082)

RUBY

INJECTION_RUBY_75.1

1

400

Second order DoS (CVE-2012-3424)

RUBY

INJECTION_RUBY_42.3

3

400

Denial of Service (CVE-2012-3424)

RUBY

INJECTION_RUBY_42.1

1

400

Second order Header DoS (CVE-2011-2930)

RUBY

INJECTION_RUBY_35.2

2

400

Symbol DoS (ActiveRecord or 'unsafe_symbol_creation')

RUBY

INJECTION_RUBY_59.1

1

400

Header DoS (CVE-2013-6414)

RUBY

INJECTION_RUBY_64.2

2

400

Symbol DoS (ActiveRecord or 'unsafe_symbol_creation')

RUBY

INJECTION_RUBY_59.2

2

400

Symbol DoS (ActiveRecord) (CVE-2013-1854)

RUBY

INJECTION_RUBY_55.2

2

470

Unsafe reflection

RUBY

INJECTION_RUBY_24.1

1

470

Unsafe reflection

RUBY

INJECTION_RUBY_24.2

2

601

Dangerous 'redirect_to'

RUBY

URL_RUBY_18.3

3

601

Dangerous 'redirect_to'

RUBY

URL_RUBY_18.1

1

639

Unsafe hrefs value

RUBY

FAILURE_RUBY_4.2

2

639

Unsafe hrefs value

RUBY

FAILURE_RUBY_4.1

1

665

Rails versions with SafeBuffer bug

RUBY

INSECURE_RUBY_21.2

2

669

Avoid using Components with Known Vulnerabilities

RUBY

LAYER_RUBY_1.2013

1

676

Vulnerable sanitize helper (CVE-2013-1857)

RUBY

SECURITMISC_RUBY_58.2

2

676

Unsafe use of select() helper

RUBY

SECURITMISC_RUBY_22.2

2

676

Versions with vulnerable sanitize and sanitize_css (CVE-2013-1855)

RUBY

SECURITMISC_RUBY_56.2

2

676

Versions with vulnerable sanitize and sanitize_css (CVE-2013-1855)

RUBY

SECURITMISC_RUBY_56.1

1

676

Vulnerable sanitize helper (CVE-2013-1857)

RUBY

SECURITMISC_RUBY_58.1

1

676

Unsafe use of select() helper

RUBY

SECURITMISC_RUBY_22.3

3

676

Unsafe use of Object#send

RUBY

SECURITMISC_RUBY_23.1

1

676

unsafe uses of select_tag() (CVE-2012-3463)

RUBY

SECURITMISC_RUBY_43.1

1

73

Unpredictable file access through user input 

RUBY

INJECTION_RUBY_16.1

1

73

Unsafe file access

RUBY

INJECTION_RUBY_15.1

1

73

Possible Unsafe file access

RUBY

INJECTION_RUBY_15.3

3

73

Possible Unpredictable file access

RUBY

INJECTION_RUBY_16.3

3

73

Second order Unsafe file access

RUBY

INJECTION_RUBY_15.2

2

73

Second order Unpredictable file access

RUBY

INJECTION_RUBY_16.2

2

732

Dangerous attributes in Model

RUBY

IMP_RUBY_19.1

1

732

Dangerous public attributes in Model (CVE-2013-0276)

RUBY

IMP_RUBY_51.1

1

732

Dangerous public attributes in Model

RUBY

IMP_RUBY_20.1

1

732

Dangerous public attributes in Model (CVE-2013-0276)

RUBY

IMP_RUBY_51.2

2

732

Dangerous public attributes in Model

RUBY

IMP_RUBY_20.2

2

732

Dangerous attributes in Model

RUBY

IMP_RUBY_19.2

2

732

Dangerous public attributes in Model

RUBY

IMP_RUBY_20.3

3

78

YAML parsing vulnerabilities (CVE-2013-0156)

RUBY

INJECTION_RUBY_48.1

1

78

Code injection (CVE-2013-0333)

RUBY

INJECTION_RUBY_14.1

1

79

Simple_format XSS (CVE-2013-6416) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_67.2

2

79

XSS (helper) (CVE-2014-0081) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_73.2

2

79

Cross Site Scripting (Unescaped JSON) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_5.2

2

79

Cross Site Scripting (Unescaped JSON) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_5.1

1

79

Cross Site Scripting (CVE-2011-2929) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_34.1

1

79

Possible XSS (link_to) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_3.2

2

79

Cross Site Scripting (JRuby) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_53.1

1

79

i18n XSS (CVE-2013-4491) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_63.2

2

79

Cross Site Scripting (Unescaped Output) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_2.1

1

79

Missing escape on single quotes (CVE-2012-3464) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_44.2

2

79

XSS vulnerability in translate helper / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_28.2

2

79

Cross Site Scripting (Unescaped JSON) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_5.3

3

79

Second order SQL injection (CVE-2013-0333)

RUBY

INJECTION_RUBY_14.2

2

79

Cross Site Scripting (Unescaped Output) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_2.3

3

79

Strip_tags vulnerabilities (CVE-2012-3465) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_45.1

1

79

Vulnerable 'strip_tags' or other escape method (CVE-2011-2931) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_36.1

1

79

XSS (sanitize and sanitize_css) (CVE-2013-1855) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_30.1

1

79

XSS vulnerability in translate helper / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_28.1

1

79

Cross Site Scripting (JRuby) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_53.2

2

79

Cross Site Scripting (Unescaped Output) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_2.2

2

79

XSS (Mail_to) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_32.1

1

79

XSS (link_to) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_3.1

1

798

Insecure SSL certificate

RUBY

LAYER_RUBY_71.1

1

89

SQL injection (:limit and :offset)

RUBY

INJECTION_RUBY_1.2

2

89

SQL injection

RUBY

INJECTION_RUBY_0.2

2

89

SQL injection (CVE-2014-0080)

RUBY

INJECTION_RUBY_72.1

1

89

SQL injection (:limit and :offset)

RUBY

INJECTION_RUBY_1.1

1

89

SQL injection

RUBY

INJECTION_RUBY_0.1

1

89

Missed evaluation of user input

RUBY

INJECTION_RUBY_13.1

1

89

SQL injection (CVE-2012-2660)

RUBY

INJECTION_RUBY_38.1

1

89

SQL injection (CVE-2012-6496)

RUBY

INJECTION_RUBY_46.1

1

89

SQL injection (CVE-2013-0155)

RUBY

INJECTION_RUBY_47.1

1

89

SQL injection (CVE-2013-6417)

RUBY

INJECTION_RUBY_69.1

1

89

SQL injection (CVE-2012-2695)

RUBY

INJECTION_RUBY_40.1

1

89

SQL injection (CVE-2012-2661)

RUBY

INJECTION_RUBY_39.1

1

91

JSON parsing vulnerabilities (CVE-2013-0269) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_49.1

1

91

Versions with JRuby XML parsing backend (CVE-2013-1856)

RUBY

INJECTION_RUBY_57.1

1

91

JSON parsing vulnerabilities (CVE-2013-0333) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_52.3

3

91

JSON parsing vulnerabilities (CVE-2013-0333) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_52.1

1

91

JSON parsing vulnerabilities (CVE-2013-0333) / Security Decisions Via Untrusted Inputs

RUBY

XSS_RUBY_52.2

2

200

Information Leakage (DBMS_OUTPUT.PUT_LINE)

SQL

PLSQL.15

3

200

Improper using of WHEN OTHERS as only exception handler.

SQL

PLSQL.21

3

200

Error Handling With Output Parameters.

SQL

PLSQL.03

3

200

Information Leakage (WHEN OTHERS THEN)

SQL

PLSQL.01

3

200

Dangerous Deprecated Feature (T-SQL)

SQL

SQL.02

2

200

Deprecated Feature (T-SQL)

SQL

SQL.01

3

200

Avoid using DBMS_UTILITY.EXEC_DDL_STATEMENT

SQL

PLSQL.33

3

200

Information Leakage (FUNCTION with OUT parameters)

SQL

PLSQL.20

2

200

Deprecated Functions Teradata SQL

SQL

SQL.04

3

200

Useless Feature (T-SQL)

SQL

SQL.03

4

257

Hardcoded Passwords

SQL

PLSQL.13

1

265

Improper Granting of all privileges on an object

SQL

PLSQL.38

1

284

Avoid using Invoker's rights (AUTHID CURRENT_USER)

SQL

PLSQL.35

1

284

Improper using of Packages to administer the network Access Control List functions inside a procedure (DBMS_NETWORK)

SQL

PLSQL.26

1

284

Package Running Under Potentially Excessive Permissions (AUTHID CURRENT_USER)

SQL

PLSQL.05

4

284

Package Running Under Potentially Excessive Permissions (AUTHID DEFINER)

SQL

PLSQL.04

4

284

The use of one of these SYS procedures performed by a SYS user will give to any user the rights of database admin and therefore allows to do everything possible including deleting all access rights.

SQL

PLSQL.25

1

311

Missing DBMS_LDAP.free_mod_array

SQL

PLSQL.29

2

326

MD5 MD4 and SHA-1 should no longer be relied upon to verify the authenticity of data in security-critical contexts.

SQL

PLSQL.39

2

327

Static Random Number Generator

SQL

PLSQL.32

2

36

Absolute Path in Source Code (SQL)

SQL

PLSQL.30

3

388

Improper masking exceptions with NULL statements

SQL

PLSQL.18

1

388

Avoid disabling DBMS_LDAP.USE_EXCEPTION.

SQL

PLSQL.27

1

388

Avoid decentralized EXCEPTION_INIT statements

SQL

PLSQL.19

3

388

Improper processing of User-Password-IP Address

SQL

PLSQL.02

2

400

SQL statement DoS (CROSS JOIN in a LOOP-FOR)

SQL

PLSQL.23

1

400

Avoid using DELETE or UPDATE without a WHERE clause

SQL

PLSQL.22

1

400

Denial Of Service Threat (dbms_lock.sleep)

SQL

PLSQL.41

1

400

SQL statement DoS (GROUP BY in a loop)

SQL

PLSQL.24

1

400

Data Formatting Within VIEW

SQL

PLSQL.07

4

477

Use DBMS_STATS instead.

SQL

PLSQL.34

3

497

Information Leakage (OWA_UTIL.print)

SQL

PLSQL.36

3

501

Improper accepting of untrusted sensitive data from a Cookie and using it without validation

SQL

PLSQL.37

1

79

Stored XSS

SQL

PLSQL.06

5

798

Hardcoded IP address

SQL

PLSQL.31

1

89

SQL Injection (deprecated DBMS_SQL.* statement)

SQL

PLSQL.16

1

89

Variable concatenated with dynamic SQL statement.

SQL

PLSQL.08

1

89

SQL injection through use of an input variable within a query.

SQL

PLSQL.9

1

89

Avoid SELECT * statements (SQL)

SQL

PLSQL.17

3

90

Populating a mod_array and using it directly in DBMS_LDAP.add_s DBMS_LDAP.modify_s DBMS_LDAP.delete_s may expose it to a LDAP Injection

SQL

PLSQL.28

1

References

(*1)CWE: Common Weakness Enumeration.
http://cwe.mitre.org/index.html

(*2)MITRE Corporation: A not-for-profit organization that provides information technology support and R&D development to the U.S. government.
http://www.mitre.org/

(*3)NIST: National Institute of Standards and Technology. A federal agency that develops and promotes measurement, standards and technology.
http://www.nist.gov/

(*4)NVD: National Vulnerability Database. A vulnerability database run by NIST.
http://nvd.nist.gov/

(*5)OWASP: Open Web Application Security Project. An open, not-for-profit community dedicated to enhancing software security by developing open source software to secure Web applications and Web sites and promoting software security.
http://www.owasp.org/

(*6)WASC: Web Application Security Consortium is a non profit made up of an international group of experts, industry practitioners, and organizational representatives who produce open source and widely agreed upon best-practice security standards for the World Wide Web.

http://www.webappsec.org/

(*7)TIOBE: The TIOBE Programming Community index is an indicator of the popularity of programming languages. The index is updated once a month. The ratings are based on the number of skilled engineers world-wide, courses and third party vendors.

https://www.tiobe.com/tiobe-index/

 

 







Related pages

COPYRIGHT (C) 2015-2024 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.