CodeQL full CWE coverage¶
An overview of the full coverage of MITRE’s Common Weakness Enumeration (CWE) for the latest release of CodeQL.
Overview¶
CWE | Language | Query id | Query name |
---|---|---|---|
CWE-11 | C# | cs/web/debug-binary | Creating an ASP.NET debug binary may reveal sensitive information |
CWE-12 | C# | cs/web/missing-global-error-handler | Missing global error handler |
CWE-13 | C# | cs/password-in-configuration | Password in configuration file |
CWE-14 | C/C++ | cpp/memset-may-be-deleted | Call to memset may be deleted |
CWE-20 | C/C++ | cpp/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-20 | C/C++ | cpp/count-untrusted-data-external-api-ir | Frequency counts for external APIs that are used with untrusted data |
CWE-20 | C/C++ | cpp/untrusted-data-to-external-api-ir | Untrusted data passed to external API |
CWE-20 | C/C++ | cpp/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-20 | C/C++ | cpp/uncontrolled-process-operation | Uncontrolled process operation |
CWE-20 | C/C++ | cpp/unclear-array-index-validation | Unclear validation of array index |
CWE-20 | C/C++ | cpp/uncontrolled-allocation-size | Uncontrolled allocation size |
CWE-20 | C/C++ | cpp/late-check-of-function-argument | Late Check Of Function Argument |
CWE-20 | C/C++ | cpp/linux-kernel-no-check-before-unsafe-put-user | Linux kernel no check before unsafe_put_user vulnerability detection |
CWE-20 | C# | cs/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-20 | C# | cs/serialization-check-bypass | Serialization check bypass |
CWE-20 | C# | cs/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-20 | C# | cs/xml/missing-validation | Missing XML validation |
CWE-20 | C# | cs/assembly-path-injection | Assembly path injection |
CWE-20 | Go | go/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-20 | Go | go/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-20 | Go | go/incomplete-url-scheme-check | Incomplete URL scheme check |
CWE-20 | Go | go/regex/missing-regexp-anchor | Missing regular expression anchor |
CWE-20 | Go | go/suspicious-character-in-regex | Suspicious characters in a regular expression |
CWE-20 | Go | go/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-20 | Go | go/untrusted-data-to-unknown-external-api | Untrusted data passed to unknown external API |
CWE-20 | Java/Kotlin | java/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-20 | Java/Kotlin | java/overly-large-range | Overly permissive regular expression range |
CWE-20 | Java/Kotlin | java/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-20 | Java/Kotlin | java/improper-validation-of-array-construction | Improper validation of user-provided size used for array construction |
CWE-20 | Java/Kotlin | java/improper-validation-of-array-construction-code-specified | Improper validation of code-specified size used for array construction |
CWE-20 | Java/Kotlin | java/improper-validation-of-array-index | Improper validation of user-provided array index |
CWE-20 | Java/Kotlin | java/improper-validation-of-array-index-code-specified | Improper validation of code-specified array index |
CWE-20 | Java/Kotlin | java/log4j-injection | Potential Log4J LDAP JNDI injection (CVE-2021-44228) |
CWE-20 | JavaScript/TypeScript | js/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-20 | JavaScript/TypeScript | js/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-20 | JavaScript/TypeScript | js/incomplete-url-scheme-check | Incomplete URL scheme check |
CWE-20 | JavaScript/TypeScript | js/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-20 | JavaScript/TypeScript | js/incorrect-suffix-check | Incorrect suffix check |
CWE-20 | JavaScript/TypeScript | js/missing-origin-check | Missing origin verification in postMessage handler |
CWE-20 | JavaScript/TypeScript | js/regex/missing-regexp-anchor | Missing regular expression anchor |
CWE-20 | JavaScript/TypeScript | js/overly-large-range | Overly permissive regular expression range |
CWE-20 | JavaScript/TypeScript | js/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-20 | JavaScript/TypeScript | js/useless-regexp-character-escape | Useless regular-expression character escape |
CWE-20 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-20 | JavaScript/TypeScript | js/double-escaping | Double escaping or unescaping |
CWE-20 | JavaScript/TypeScript | js/incomplete-html-attribute-sanitization | Incomplete HTML attribute sanitization |
CWE-20 | JavaScript/TypeScript | js/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-20 | JavaScript/TypeScript | js/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-20 | JavaScript/TypeScript | js/untrusted-data-to-external-api-more-sources | Untrusted data passed to external API with additional heuristic sources |
CWE-20 | Python | py/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-20 | Python | py/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-20 | Python | py/cookie-injection | Construction of a cookie using user-supplied input |
CWE-20 | Python | py/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-20 | Python | py/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-20 | Python | py/overly-large-range | Overly permissive regular expression range |
CWE-20 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-20 | Ruby | rb/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-20 | Ruby | rb/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-20 | Ruby | rb/regex/badly-anchored-regexp | Badly anchored regular expression |
CWE-20 | Ruby | rb/regex/missing-regexp-anchor | Missing regular expression anchor |
CWE-20 | Ruby | rb/overly-large-range | Overly permissive regular expression range |
CWE-20 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-20 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-20 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-20 | Swift | swift/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-20 | Swift | swift/missing-regexp-anchor | Missing regular expression anchor |
CWE-20 | Swift | swift/bad-tag-filter | Bad HTML filtering regexp |
CWE-22 | C/C++ | cpp/path-injection | Uncontrolled data used in path expression |
CWE-22 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-22 | C# | cs/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-22 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-22 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-22 | Go | go/unsafe-unzip-symlink | Arbitrary file write extracting an archive containing symbolic links |
CWE-22 | Go | go/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-22 | Java/Kotlin | java/path-injection | Uncontrolled data used in path expression |
CWE-22 | Java/Kotlin | java/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-22 | Java/Kotlin | java/partial-path-traversal | Partial path traversal vulnerability |
CWE-22 | Java/Kotlin | java/partial-path-traversal-from-remote | Partial path traversal vulnerability from remote |
CWE-22 | Java/Kotlin | java/openstream-called-on-tainted-url | openStream called on URLs created from remote source |
CWE-22 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-22 | JavaScript/TypeScript | js/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-22 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-22 | Python | py/tarslip | Arbitrary file write during tarfile extraction |
CWE-22 | Python | py/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-22 | Python | py/tarslip-extended | Arbitrary file write during tarfile extraction |
CWE-22 | Python | py/unsafe-unpacking | Arbitrary file write during a tarball extraction from a user controlled source |
CWE-22 | Ruby | rb/zip-slip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-22 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-22 | Swift | swift/unsafe-unpacking | Arbitrary file write during a zip extraction from a user controlled source |
CWE-22 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-23 | C/C++ | cpp/path-injection | Uncontrolled data used in path expression |
CWE-23 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-23 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-23 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-23 | Java/Kotlin | java/path-injection | Uncontrolled data used in path expression |
CWE-23 | Java/Kotlin | java/partial-path-traversal | Partial path traversal vulnerability |
CWE-23 | Java/Kotlin | java/partial-path-traversal-from-remote | Partial path traversal vulnerability from remote |
CWE-23 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-23 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-23 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-23 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-36 | C/C++ | cpp/path-injection | Uncontrolled data used in path expression |
CWE-36 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-36 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-36 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-36 | Java/Kotlin | java/path-injection | Uncontrolled data used in path expression |
CWE-36 | Java/Kotlin | java/openstream-called-on-tainted-url | openStream called on URLs created from remote source |
CWE-36 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-36 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-36 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-36 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-73 | C/C++ | cpp/path-injection | Uncontrolled data used in path expression |
CWE-73 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-73 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-73 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-73 | Java/Kotlin | java/path-injection | Uncontrolled data used in path expression |
CWE-73 | Java/Kotlin | java/file-path-injection | File Path Injection |
CWE-73 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-73 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-73 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-73 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-73 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-73 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-73 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-73 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-73 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-74 | C/C++ | cpp/non-constant-format | Non-constant format string |
CWE-74 | C/C++ | cpp/command-line-injection | Uncontrolled data used in OS command |
CWE-74 | C/C++ | cpp/cgi-xss | CGI script vulnerable to cross-site scripting |
CWE-74 | C/C++ | cpp/sql-injection | Uncontrolled data in SQL query |
CWE-74 | C/C++ | cpp/tainted-format-string | Uncontrolled format string |
CWE-74 | C/C++ | cpp/wordexp-injection | Uncontrolled data used in wordexp command |
CWE-74 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-74 | C# | cs/command-line-injection | Uncontrolled command line |
CWE-74 | C# | cs/web/xss | Cross-site scripting |
CWE-74 | C# | cs/sql-injection | SQL query built from user-controlled sources |
CWE-74 | C# | cs/ldap-injection | LDAP query built from user-controlled sources |
CWE-74 | C# | cs/xml-injection | XML injection |
CWE-74 | C# | cs/code-injection | Improper control of generation of code |
CWE-74 | C# | cs/resource-injection | Resource injection |
CWE-74 | C# | cs/uncontrolled-format-string | Uncontrolled format string |
CWE-74 | C# | cs/xml/xpath-injection | XPath injection |
CWE-74 | C# | cs/web/disabled-header-checking | Header checking disabled |
CWE-74 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-74 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-74 | Go | go/command-injection | Command built from user-controlled sources |
CWE-74 | Go | go/stored-command | Command built from stored data |
CWE-74 | Go | go/reflected-xss | Reflected cross-site scripting |
CWE-74 | Go | go/stored-xss | Stored cross-site scripting |
CWE-74 | Go | go/sql-injection | Database query built from user-controlled sources |
CWE-74 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-74 | Go | go/xml/xpath-injection | XPath injection |
CWE-74 | Go | go/ldap-injection | LDAP query built from user-controlled sources |
CWE-74 | Go | go/dsn-injection | SQL Data-source URI built from user-controlled sources |
CWE-74 | Go | go/dsn-injection-local | SQL Data-source URI built from local user-controlled sources |
CWE-74 | Go | go/html-template-escaping-passthrough | HTML template escaping passthrough |
CWE-74 | Java/Kotlin | java/jndi-injection | JNDI lookup with user-controlled name |
CWE-74 | Java/Kotlin | java/xslt-injection | XSLT transformation with user-controlled stylesheet |
CWE-74 | Java/Kotlin | java/relative-path-command | Executing a command with a relative path |
CWE-74 | Java/Kotlin | java/command-line-injection | Uncontrolled command line |
CWE-74 | Java/Kotlin | java/exec-tainted-environment | Building a command with an injected environment variable |
CWE-74 | Java/Kotlin | java/concatenated-command-line | Building a command line with string concatenation |
CWE-74 | Java/Kotlin | java/android/webview-addjavascriptinterface | Access Java object methods through JavaScript exposure |
CWE-74 | Java/Kotlin | java/android/websettings-javascript-enabled | Android WebView JavaScript settings |
CWE-74 | Java/Kotlin | java/xss | Cross-site scripting |
CWE-74 | Java/Kotlin | java/concatenated-sql-query | Query built by concatenation with a possibly-untrusted string |
CWE-74 | Java/Kotlin | java/sql-injection | Query built from user-controlled sources |
CWE-74 | Java/Kotlin | java/ldap-injection | LDAP query built from user-controlled sources |
CWE-74 | Java/Kotlin | java/android/arbitrary-apk-installation | Android APK installation |
CWE-74 | Java/Kotlin | java/groovy-injection | Groovy Language injection |
CWE-74 | Java/Kotlin | java/insecure-bean-validation | Insecure Bean Validation |
CWE-74 | Java/Kotlin | java/jexl-expression-injection | Expression language injection (JEXL) |
CWE-74 | Java/Kotlin | java/mvel-expression-injection | Expression language injection (MVEL) |
CWE-74 | Java/Kotlin | java/spel-expression-injection | Expression language injection (Spring) |
CWE-74 | Java/Kotlin | java/server-side-template-injection | Server-side template injection |
CWE-74 | Java/Kotlin | java/netty-http-request-or-response-splitting | Disabled Netty HTTP header validation |
CWE-74 | Java/Kotlin | java/http-response-splitting | HTTP response splitting |
CWE-74 | Java/Kotlin | java/tainted-format-string | Use of externally-controlled format string |
CWE-74 | Java/Kotlin | java/xml/xpath-injection | XPath injection |
CWE-74 | Java/Kotlin | java/android/unsafe-android-webview-fetch | Unsafe resource fetching in Android WebView |
CWE-74 | Java/Kotlin | java/ognl-injection | OGNL Expression Language statement with user-controlled input |
CWE-74 | Java/Kotlin | java/log4j-injection | Potential Log4J LDAP JNDI injection (CVE-2021-44228) |
CWE-74 | Java/Kotlin | java/command-line-injection-extra | Command Injection into Runtime.exec() with dangerous command |
CWE-74 | Java/Kotlin | java/command-line-injection-extra-local | Command Injection into Runtime.exec() with dangerous command |
CWE-74 | Java/Kotlin | java/command-line-injection-experimental | Uncontrolled command line (experimental sinks) |
CWE-74 | Java/Kotlin | java/mybatis-annotation-sql-injection | SQL injection in MyBatis annotation |
CWE-74 | Java/Kotlin | java/mybatis-xml-sql-injection | SQL injection in MyBatis Mapper XML |
CWE-74 | Java/Kotlin | java/beanshell-injection | BeanShell injection |
CWE-74 | Java/Kotlin | java/android-insecure-dex-loading | Insecure loading of an Android Dex File |
CWE-74 | Java/Kotlin | java/jshell-injection | JShell injection |
CWE-74 | Java/Kotlin | java/javaee-expression-injection | Jakarta Expression Language injection |
CWE-74 | Java/Kotlin | java/jython-injection | Injection in Jython |
CWE-74 | Java/Kotlin | java/unsafe-eval | Injection in Java Script Engine |
CWE-74 | Java/Kotlin | java/spring-view-manipulation-implicit | Spring Implicit View Manipulation |
CWE-74 | Java/Kotlin | java/spring-view-manipulation | Spring View Manipulation |
CWE-74 | Java/Kotlin | java/xquery-injection | XQuery query built from user-controlled sources |
CWE-74 | JavaScript/TypeScript | js/disabling-electron-websecurity | Disabling Electron webSecurity |
CWE-74 | JavaScript/TypeScript | js/enabling-electron-renderer-node-integration | Enabling Node.js integration for Electron web content renderers |
CWE-74 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-74 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-74 | JavaScript/TypeScript | js/command-line-injection | Uncontrolled command line |
CWE-74 | JavaScript/TypeScript | js/indirect-command-line-injection | Indirect uncontrolled command line |
CWE-74 | JavaScript/TypeScript | js/second-order-command-line-injection | Second order command injection |
CWE-74 | JavaScript/TypeScript | js/shell-command-injection-from-environment | Shell command built from environment values |
CWE-74 | JavaScript/TypeScript | js/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-74 | JavaScript/TypeScript | js/unnecessary-use-of-cat | Unnecessary use of cat process |
CWE-74 | JavaScript/TypeScript | js/xss-through-exception | Exception text reinterpreted as HTML |
CWE-74 | JavaScript/TypeScript | js/reflected-xss | Reflected cross-site scripting |
CWE-74 | JavaScript/TypeScript | js/stored-xss | Stored cross-site scripting |
CWE-74 | JavaScript/TypeScript | js/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-74 | JavaScript/TypeScript | js/unsafe-jquery-plugin | Unsafe jQuery plugin |
CWE-74 | JavaScript/TypeScript | js/xss | Client-side cross-site scripting |
CWE-74 | JavaScript/TypeScript | js/xss-through-dom | DOM text reinterpreted as HTML |
CWE-74 | JavaScript/TypeScript | js/sql-injection | Database query built from user-controlled sources |
CWE-74 | JavaScript/TypeScript | js/code-injection | Code injection |
CWE-74 | JavaScript/TypeScript | js/actions/command-injection | Expression injection in Actions |
CWE-74 | JavaScript/TypeScript | js/bad-code-sanitization | Improper code sanitization |
CWE-74 | JavaScript/TypeScript | js/unsafe-code-construction | Unsafe code constructed from library input |
CWE-74 | JavaScript/TypeScript | js/unsafe-dynamic-method-access | Unsafe dynamic method access |
CWE-74 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-74 | JavaScript/TypeScript | js/incomplete-html-attribute-sanitization | Incomplete HTML attribute sanitization |
CWE-74 | JavaScript/TypeScript | js/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-74 | JavaScript/TypeScript | js/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-74 | JavaScript/TypeScript | js/unsafe-html-expansion | Unsafe expansion of self-closing HTML tag |
CWE-74 | JavaScript/TypeScript | js/tainted-format-string | Use of externally-controlled format string |
CWE-74 | JavaScript/TypeScript | js/client-side-unvalidated-url-redirection | Client-side URL redirect |
CWE-74 | JavaScript/TypeScript | js/xpath-injection | XPath injection |
CWE-74 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-74 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-74 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-74 | JavaScript/TypeScript | js/code-injection-dynamic-import | Code injection |
CWE-74 | JavaScript/TypeScript | js/actions/pull-request-target | Checkout of untrusted code in trusted context |
CWE-74 | JavaScript/TypeScript | js/env-key-and-value-injection | User controlled arbitrary environment variable injection |
CWE-74 | JavaScript/TypeScript | js/env-value-injection | User controlled environment variable value injection |
CWE-74 | JavaScript/TypeScript | js/command-line-injection-more-sources | Uncontrolled command line with additional heuristic sources |
CWE-74 | JavaScript/TypeScript | js/xss-more-sources | Client-side cross-site scripting with additional heuristic sources |
CWE-74 | JavaScript/TypeScript | js/sql-injection-more-sources | Database query built from user-controlled sources with additional heuristic sources |
CWE-74 | JavaScript/TypeScript | js/code-injection-more-sources | Code injection with additional heuristic sources |
CWE-74 | JavaScript/TypeScript | js/tainted-format-string-more-sources | Use of externally-controlled format string with additional heuristic sources |
CWE-74 | JavaScript/TypeScript | js/xpath-injection-more-sources | XPath injection with additional heuristic sources |
CWE-74 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-74 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-74 | Python | py/command-line-injection | Uncontrolled command line |
CWE-74 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-74 | Python | py/jinja2/autoescape-false | Jinja2 templating with autoescape=False |
CWE-74 | Python | py/reflective-xss | Reflected server-side cross-site scripting |
CWE-74 | Python | py/sql-injection | SQL query built from user-controlled sources |
CWE-74 | Python | py/ldap-injection | LDAP query built from user-controlled sources |
CWE-74 | Python | py/code-injection | Code injection |
CWE-74 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-74 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-74 | Python | py/nosql-injection | NoSQL Injection |
CWE-74 | Python | py/template-injection | Server Side Template Injection |
CWE-74 | Python | py/paramiko-command-injection | Command execution on a secondary remote server |
CWE-74 | Python | py/reflective-xss-email | Reflected server-side cross-site scripting |
CWE-74 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-74 | Python | py/js2py-rce | JavaScript code execution. |
CWE-74 | Ruby | rb/ldap-injection | LDAP Injection |
CWE-74 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-74 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-74 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-74 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-74 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-74 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-74 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-74 | Ruby | rb/reflected-xss | Reflected server-side cross-site scripting |
CWE-74 | Ruby | rb/stored-xss | Stored cross-site scripting |
CWE-74 | Ruby | rb/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-74 | Ruby | rb/sql-injection | SQL query built from user-controlled sources |
CWE-74 | Ruby | rb/code-injection | Code injection |
CWE-74 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-74 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-74 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-74 | Ruby | rb/tainted-format-string | Use of externally-controlled format string |
CWE-74 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-74 | Swift | swift/command-line-injection | System command built from user-controlled sources |
CWE-74 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-74 | Swift | swift/sql-injection | Database query built from user-controlled sources |
CWE-74 | Swift | swift/unsafe-js-eval | JavaScript Injection |
CWE-74 | Swift | swift/uncontrolled-format-string | Uncontrolled format string |
CWE-74 | Swift | swift/predicate-injection | Predicate built from user-controlled sources |
CWE-77 | C/C++ | cpp/command-line-injection | Uncontrolled data used in OS command |
CWE-77 | C/C++ | cpp/wordexp-injection | Uncontrolled data used in wordexp command |
CWE-77 | C# | cs/command-line-injection | Uncontrolled command line |
CWE-77 | Go | go/command-injection | Command built from user-controlled sources |
CWE-77 | Go | go/stored-command | Command built from stored data |
CWE-77 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-77 | Java/Kotlin | java/relative-path-command | Executing a command with a relative path |
CWE-77 | Java/Kotlin | java/command-line-injection | Uncontrolled command line |
CWE-77 | Java/Kotlin | java/exec-tainted-environment | Building a command with an injected environment variable |
CWE-77 | Java/Kotlin | java/concatenated-command-line | Building a command line with string concatenation |
CWE-77 | Java/Kotlin | java/ognl-injection | OGNL Expression Language statement with user-controlled input |
CWE-77 | Java/Kotlin | java/command-line-injection-extra | Command Injection into Runtime.exec() with dangerous command |
CWE-77 | Java/Kotlin | java/command-line-injection-extra-local | Command Injection into Runtime.exec() with dangerous command |
CWE-77 | Java/Kotlin | java/command-line-injection-experimental | Uncontrolled command line (experimental sinks) |
CWE-77 | JavaScript/TypeScript | js/command-line-injection | Uncontrolled command line |
CWE-77 | JavaScript/TypeScript | js/indirect-command-line-injection | Indirect uncontrolled command line |
CWE-77 | JavaScript/TypeScript | js/second-order-command-line-injection | Second order command injection |
CWE-77 | JavaScript/TypeScript | js/shell-command-injection-from-environment | Shell command built from environment values |
CWE-77 | JavaScript/TypeScript | js/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-77 | JavaScript/TypeScript | js/unnecessary-use-of-cat | Unnecessary use of cat process |
CWE-77 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-77 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-77 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-77 | JavaScript/TypeScript | js/command-line-injection-more-sources | Uncontrolled command line with additional heuristic sources |
CWE-77 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-77 | Python | py/command-line-injection | Uncontrolled command line |
CWE-77 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-77 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-77 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-77 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-77 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-77 | Swift | swift/command-line-injection | System command built from user-controlled sources |
CWE-78 | C/C++ | cpp/command-line-injection | Uncontrolled data used in OS command |
CWE-78 | C/C++ | cpp/wordexp-injection | Uncontrolled data used in wordexp command |
CWE-78 | C# | cs/command-line-injection | Uncontrolled command line |
CWE-78 | Go | go/command-injection | Command built from user-controlled sources |
CWE-78 | Go | go/stored-command | Command built from stored data |
CWE-78 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-78 | Java/Kotlin | java/relative-path-command | Executing a command with a relative path |
CWE-78 | Java/Kotlin | java/command-line-injection | Uncontrolled command line |
CWE-78 | Java/Kotlin | java/exec-tainted-environment | Building a command with an injected environment variable |
CWE-78 | Java/Kotlin | java/concatenated-command-line | Building a command line with string concatenation |
CWE-78 | Java/Kotlin | java/command-line-injection-extra | Command Injection into Runtime.exec() with dangerous command |
CWE-78 | Java/Kotlin | java/command-line-injection-extra-local | Command Injection into Runtime.exec() with dangerous command |
CWE-78 | Java/Kotlin | java/command-line-injection-experimental | Uncontrolled command line (experimental sinks) |
CWE-78 | JavaScript/TypeScript | js/command-line-injection | Uncontrolled command line |
CWE-78 | JavaScript/TypeScript | js/indirect-command-line-injection | Indirect uncontrolled command line |
CWE-78 | JavaScript/TypeScript | js/second-order-command-line-injection | Second order command injection |
CWE-78 | JavaScript/TypeScript | js/shell-command-injection-from-environment | Shell command built from environment values |
CWE-78 | JavaScript/TypeScript | js/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-78 | JavaScript/TypeScript | js/unnecessary-use-of-cat | Unnecessary use of cat process |
CWE-78 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-78 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-78 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-78 | JavaScript/TypeScript | js/command-line-injection-more-sources | Uncontrolled command line with additional heuristic sources |
CWE-78 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-78 | Python | py/command-line-injection | Uncontrolled command line |
CWE-78 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-78 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-78 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-78 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-78 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-78 | Swift | swift/command-line-injection | System command built from user-controlled sources |
CWE-79 | C/C++ | cpp/cgi-xss | CGI script vulnerable to cross-site scripting |
CWE-79 | C# | cs/web/xss | Cross-site scripting |
CWE-79 | Go | go/reflected-xss | Reflected cross-site scripting |
CWE-79 | Go | go/stored-xss | Stored cross-site scripting |
CWE-79 | Go | go/html-template-escaping-passthrough | HTML template escaping passthrough |
CWE-79 | Java/Kotlin | java/android/webview-addjavascriptinterface | Access Java object methods through JavaScript exposure |
CWE-79 | Java/Kotlin | java/android/websettings-javascript-enabled | Android WebView JavaScript settings |
CWE-79 | Java/Kotlin | java/xss | Cross-site scripting |
CWE-79 | Java/Kotlin | java/android/unsafe-android-webview-fetch | Unsafe resource fetching in Android WebView |
CWE-79 | JavaScript/TypeScript | js/disabling-electron-websecurity | Disabling Electron webSecurity |
CWE-79 | JavaScript/TypeScript | js/xss-through-exception | Exception text reinterpreted as HTML |
CWE-79 | JavaScript/TypeScript | js/reflected-xss | Reflected cross-site scripting |
CWE-79 | JavaScript/TypeScript | js/stored-xss | Stored cross-site scripting |
CWE-79 | JavaScript/TypeScript | js/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-79 | JavaScript/TypeScript | js/unsafe-jquery-plugin | Unsafe jQuery plugin |
CWE-79 | JavaScript/TypeScript | js/xss | Client-side cross-site scripting |
CWE-79 | JavaScript/TypeScript | js/xss-through-dom | DOM text reinterpreted as HTML |
CWE-79 | JavaScript/TypeScript | js/code-injection | Code injection |
CWE-79 | JavaScript/TypeScript | js/bad-code-sanitization | Improper code sanitization |
CWE-79 | JavaScript/TypeScript | js/unsafe-code-construction | Unsafe code constructed from library input |
CWE-79 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-79 | JavaScript/TypeScript | js/incomplete-html-attribute-sanitization | Incomplete HTML attribute sanitization |
CWE-79 | JavaScript/TypeScript | js/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-79 | JavaScript/TypeScript | js/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-79 | JavaScript/TypeScript | js/unsafe-html-expansion | Unsafe expansion of self-closing HTML tag |
CWE-79 | JavaScript/TypeScript | js/client-side-unvalidated-url-redirection | Client-side URL redirect |
CWE-79 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-79 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-79 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-79 | JavaScript/TypeScript | js/code-injection-dynamic-import | Code injection |
CWE-79 | JavaScript/TypeScript | js/xss-more-sources | Client-side cross-site scripting with additional heuristic sources |
CWE-79 | JavaScript/TypeScript | js/code-injection-more-sources | Code injection with additional heuristic sources |
CWE-79 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-79 | Python | py/jinja2/autoescape-false | Jinja2 templating with autoescape=False |
CWE-79 | Python | py/reflective-xss | Reflected server-side cross-site scripting |
CWE-79 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-79 | Python | py/reflective-xss-email | Reflected server-side cross-site scripting |
CWE-79 | Ruby | rb/reflected-xss | Reflected server-side cross-site scripting |
CWE-79 | Ruby | rb/stored-xss | Stored cross-site scripting |
CWE-79 | Ruby | rb/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-79 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-79 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-79 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-79 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-80 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-80 | JavaScript/TypeScript | js/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-80 | JavaScript/TypeScript | js/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-80 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-80 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-88 | C/C++ | cpp/command-line-injection | Uncontrolled data used in OS command |
CWE-88 | C# | cs/command-line-injection | Uncontrolled command line |
CWE-88 | Java/Kotlin | java/relative-path-command | Executing a command with a relative path |
CWE-88 | Java/Kotlin | java/command-line-injection | Uncontrolled command line |
CWE-88 | Java/Kotlin | java/exec-tainted-environment | Building a command with an injected environment variable |
CWE-88 | Java/Kotlin | java/concatenated-command-line | Building a command line with string concatenation |
CWE-88 | Java/Kotlin | java/command-line-injection-experimental | Uncontrolled command line (experimental sinks) |
CWE-88 | JavaScript/TypeScript | js/command-line-injection | Uncontrolled command line |
CWE-88 | JavaScript/TypeScript | js/indirect-command-line-injection | Indirect uncontrolled command line |
CWE-88 | JavaScript/TypeScript | js/second-order-command-line-injection | Second order command injection |
CWE-88 | JavaScript/TypeScript | js/shell-command-injection-from-environment | Shell command built from environment values |
CWE-88 | JavaScript/TypeScript | js/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-88 | JavaScript/TypeScript | js/command-line-injection-more-sources | Uncontrolled command line with additional heuristic sources |
CWE-88 | Python | py/command-line-injection | Uncontrolled command line |
CWE-88 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-88 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-88 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-88 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-88 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-88 | Swift | swift/command-line-injection | System command built from user-controlled sources |
CWE-89 | C/C++ | cpp/sql-injection | Uncontrolled data in SQL query |
CWE-89 | C# | cs/sql-injection | SQL query built from user-controlled sources |
CWE-89 | Go | go/sql-injection | Database query built from user-controlled sources |
CWE-89 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-89 | Java/Kotlin | java/concatenated-sql-query | Query built by concatenation with a possibly-untrusted string |
CWE-89 | Java/Kotlin | java/sql-injection | Query built from user-controlled sources |
CWE-89 | Java/Kotlin | java/mybatis-annotation-sql-injection | SQL injection in MyBatis annotation |
CWE-89 | Java/Kotlin | java/mybatis-xml-sql-injection | SQL injection in MyBatis Mapper XML |
CWE-89 | JavaScript/TypeScript | js/sql-injection | Database query built from user-controlled sources |
CWE-89 | JavaScript/TypeScript | js/env-key-and-value-injection | User controlled arbitrary environment variable injection |
CWE-89 | JavaScript/TypeScript | js/env-value-injection | User controlled environment variable value injection |
CWE-89 | JavaScript/TypeScript | js/sql-injection-more-sources | Database query built from user-controlled sources with additional heuristic sources |
CWE-89 | Python | py/sql-injection | SQL query built from user-controlled sources |
CWE-89 | Ruby | rb/sql-injection | SQL query built from user-controlled sources |
CWE-89 | Swift | swift/sql-injection | Database query built from user-controlled sources |
CWE-90 | C# | cs/ldap-injection | LDAP query built from user-controlled sources |
CWE-90 | Go | go/ldap-injection | LDAP query built from user-controlled sources |
CWE-90 | Java/Kotlin | java/ldap-injection | LDAP query built from user-controlled sources |
CWE-90 | JavaScript/TypeScript | js/sql-injection | Database query built from user-controlled sources |
CWE-90 | JavaScript/TypeScript | js/sql-injection-more-sources | Database query built from user-controlled sources with additional heuristic sources |
CWE-90 | Python | py/ldap-injection | LDAP query built from user-controlled sources |
CWE-90 | Ruby | rb/ldap-injection | LDAP Injection |
CWE-91 | C# | cs/xml-injection | XML injection |
CWE-91 | C# | cs/xml/xpath-injection | XPath injection |
CWE-91 | Go | go/xml/xpath-injection | XPath injection |
CWE-91 | Java/Kotlin | java/xml/xpath-injection | XPath injection |
CWE-91 | Java/Kotlin | java/xquery-injection | XQuery query built from user-controlled sources |
CWE-91 | JavaScript/TypeScript | js/xpath-injection | XPath injection |
CWE-91 | JavaScript/TypeScript | js/xpath-injection-more-sources | XPath injection with additional heuristic sources |
CWE-91 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-91 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-91 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-93 | C# | cs/web/disabled-header-checking | Header checking disabled |
CWE-93 | Java/Kotlin | java/netty-http-request-or-response-splitting | Disabled Netty HTTP header validation |
CWE-93 | Java/Kotlin | java/http-response-splitting | HTTP response splitting |
CWE-93 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-94 | C# | cs/code-injection | Improper control of generation of code |
CWE-94 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-94 | Java/Kotlin | java/android/arbitrary-apk-installation | Android APK installation |
CWE-94 | Java/Kotlin | java/groovy-injection | Groovy Language injection |
CWE-94 | Java/Kotlin | java/insecure-bean-validation | Insecure Bean Validation |
CWE-94 | Java/Kotlin | java/jexl-expression-injection | Expression language injection (JEXL) |
CWE-94 | Java/Kotlin | java/mvel-expression-injection | Expression language injection (MVEL) |
CWE-94 | Java/Kotlin | java/spel-expression-injection | Expression language injection (Spring) |
CWE-94 | Java/Kotlin | java/server-side-template-injection | Server-side template injection |
CWE-94 | Java/Kotlin | java/beanshell-injection | BeanShell injection |
CWE-94 | Java/Kotlin | java/android-insecure-dex-loading | Insecure loading of an Android Dex File |
CWE-94 | Java/Kotlin | java/jshell-injection | JShell injection |
CWE-94 | Java/Kotlin | java/javaee-expression-injection | Jakarta Expression Language injection |
CWE-94 | Java/Kotlin | java/jython-injection | Injection in Jython |
CWE-94 | Java/Kotlin | java/unsafe-eval | Injection in Java Script Engine |
CWE-94 | Java/Kotlin | java/spring-view-manipulation-implicit | Spring Implicit View Manipulation |
CWE-94 | Java/Kotlin | java/spring-view-manipulation | Spring View Manipulation |
CWE-94 | JavaScript/TypeScript | js/enabling-electron-renderer-node-integration | Enabling Node.js integration for Electron web content renderers |
CWE-94 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-94 | JavaScript/TypeScript | js/code-injection | Code injection |
CWE-94 | JavaScript/TypeScript | js/actions/command-injection | Expression injection in Actions |
CWE-94 | JavaScript/TypeScript | js/bad-code-sanitization | Improper code sanitization |
CWE-94 | JavaScript/TypeScript | js/unsafe-code-construction | Unsafe code constructed from library input |
CWE-94 | JavaScript/TypeScript | js/unsafe-dynamic-method-access | Unsafe dynamic method access |
CWE-94 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-94 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-94 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-94 | JavaScript/TypeScript | js/code-injection-dynamic-import | Code injection |
CWE-94 | JavaScript/TypeScript | js/actions/pull-request-target | Checkout of untrusted code in trusted context |
CWE-94 | JavaScript/TypeScript | js/code-injection-more-sources | Code injection with additional heuristic sources |
CWE-94 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-94 | Python | py/code-injection | Code injection |
CWE-94 | Python | py/js2py-rce | JavaScript code execution. |
CWE-94 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-94 | Ruby | rb/code-injection | Code injection |
CWE-94 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-94 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-94 | Swift | swift/unsafe-js-eval | JavaScript Injection |
CWE-95 | C# | cs/code-injection | Improper control of generation of code |
CWE-95 | Java/Kotlin | java/jython-injection | Injection in Jython |
CWE-95 | JavaScript/TypeScript | js/code-injection | Code injection |
CWE-95 | JavaScript/TypeScript | js/code-injection-dynamic-import | Code injection |
CWE-95 | JavaScript/TypeScript | js/code-injection-more-sources | Code injection with additional heuristic sources |
CWE-95 | Python | py/code-injection | Code injection |
CWE-95 | Ruby | rb/code-injection | Code injection |
CWE-95 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-95 | Swift | swift/unsafe-js-eval | JavaScript Injection |
CWE-96 | C# | cs/code-injection | Improper control of generation of code |
CWE-99 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-99 | C# | cs/resource-injection | Resource injection |
CWE-99 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-99 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-99 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-99 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-99 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-99 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-112 | C# | cs/xml/missing-validation | Missing XML validation |
CWE-113 | C# | cs/web/disabled-header-checking | Header checking disabled |
CWE-113 | Java/Kotlin | java/netty-http-request-or-response-splitting | Disabled Netty HTTP header validation |
CWE-113 | Java/Kotlin | java/http-response-splitting | HTTP response splitting |
CWE-113 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-114 | C/C++ | cpp/uncontrolled-process-operation | Uncontrolled process operation |
CWE-114 | C# | cs/assembly-path-injection | Assembly path injection |
CWE-116 | C# | cs/web/xss | Cross-site scripting |
CWE-116 | C# | cs/log-forging | Log entries created from user input |
CWE-116 | C# | cs/inappropriate-encoding | Inappropriate encoding |
CWE-116 | Go | go/reflected-xss | Reflected cross-site scripting |
CWE-116 | Go | go/stored-xss | Stored cross-site scripting |
CWE-116 | Go | go/log-injection | Log entries created from user input |
CWE-116 | Java/Kotlin | java/log-injection | Log Injection |
CWE-116 | JavaScript/TypeScript | js/angular/disabling-sce | Disabling SCE |
CWE-116 | JavaScript/TypeScript | js/identity-replacement | Replacement of a substring with itself |
CWE-116 | JavaScript/TypeScript | js/xss-through-exception | Exception text reinterpreted as HTML |
CWE-116 | JavaScript/TypeScript | js/reflected-xss | Reflected cross-site scripting |
CWE-116 | JavaScript/TypeScript | js/stored-xss | Stored cross-site scripting |
CWE-116 | JavaScript/TypeScript | js/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-116 | JavaScript/TypeScript | js/unsafe-jquery-plugin | Unsafe jQuery plugin |
CWE-116 | JavaScript/TypeScript | js/xss | Client-side cross-site scripting |
CWE-116 | JavaScript/TypeScript | js/xss-through-dom | DOM text reinterpreted as HTML |
CWE-116 | JavaScript/TypeScript | js/code-injection | Code injection |
CWE-116 | JavaScript/TypeScript | js/bad-code-sanitization | Improper code sanitization |
CWE-116 | JavaScript/TypeScript | js/unsafe-code-construction | Unsafe code constructed from library input |
CWE-116 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-116 | JavaScript/TypeScript | js/double-escaping | Double escaping or unescaping |
CWE-116 | JavaScript/TypeScript | js/incomplete-html-attribute-sanitization | Incomplete HTML attribute sanitization |
CWE-116 | JavaScript/TypeScript | js/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-116 | JavaScript/TypeScript | js/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-116 | JavaScript/TypeScript | js/unsafe-html-expansion | Unsafe expansion of self-closing HTML tag |
CWE-116 | JavaScript/TypeScript | js/log-injection | Log injection |
CWE-116 | JavaScript/TypeScript | js/client-side-unvalidated-url-redirection | Client-side URL redirect |
CWE-116 | JavaScript/TypeScript | js/code-injection-dynamic-import | Code injection |
CWE-116 | JavaScript/TypeScript | js/xss-more-sources | Client-side cross-site scripting with additional heuristic sources |
CWE-116 | JavaScript/TypeScript | js/code-injection-more-sources | Code injection with additional heuristic sources |
CWE-116 | JavaScript/TypeScript | js/log-injection-more-sources | Log injection with additional heuristic sources |
CWE-116 | Python | py/reflective-xss | Reflected server-side cross-site scripting |
CWE-116 | Python | py/code-injection | Code injection |
CWE-116 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-116 | Python | py/log-injection | Log Injection |
CWE-116 | Python | py/reflective-xss-email | Reflected server-side cross-site scripting |
CWE-116 | Ruby | rb/reflected-xss | Reflected server-side cross-site scripting |
CWE-116 | Ruby | rb/stored-xss | Stored cross-site scripting |
CWE-116 | Ruby | rb/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-116 | Ruby | rb/code-injection | Code injection |
CWE-116 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-116 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-116 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-116 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-116 | Ruby | rb/log-injection | Log injection |
CWE-116 | Swift | swift/bad-tag-filter | Bad HTML filtering regexp |
CWE-117 | C# | cs/log-forging | Log entries created from user input |
CWE-117 | Go | go/log-injection | Log entries created from user input |
CWE-117 | Java/Kotlin | java/log-injection | Log Injection |
CWE-117 | JavaScript/TypeScript | js/log-injection | Log injection |
CWE-117 | JavaScript/TypeScript | js/log-injection-more-sources | Log injection with additional heuristic sources |
CWE-117 | Python | py/log-injection | Log Injection |
CWE-117 | Ruby | rb/log-injection | Log injection |
CWE-118 | C/C++ | cpp/offset-use-before-range-check | Array offset used before range check |
CWE-118 | C/C++ | cpp/double-free | Potential double free |
CWE-118 | C/C++ | cpp/late-negative-test | Pointer offset used before it is checked |
CWE-118 | C/C++ | cpp/missing-negativity-test | Unchecked return value used as offset |
CWE-118 | C/C++ | cpp/overflow-calculated | Buffer not sufficient for string |
CWE-118 | C/C++ | cpp/overflow-destination | Copy function using source size |
CWE-118 | C/C++ | cpp/static-buffer-overflow | Static array access may cause overflow |
CWE-118 | C/C++ | cpp/allocation-too-small | Not enough memory allocated for pointer type |
CWE-118 | C/C++ | cpp/suspicious-allocation-size | Not enough memory allocated for array of pointer type |
CWE-118 | C/C++ | cpp/use-after-free | Potential use after free |
CWE-118 | C/C++ | cpp/upcast-array-pointer-arithmetic | Upcast array used in pointer arithmetic |
CWE-118 | C/C++ | cpp/return-stack-allocated-memory | Returning stack-allocated memory |
CWE-118 | C/C++ | cpp/bad-strncpy-size | Possibly wrong buffer size in string copy |
CWE-118 | C/C++ | cpp/unsafe-strncat | Potentially unsafe call to strncat |
CWE-118 | C/C++ | cpp/unsafe-strcat | Potentially unsafe use of strcat |
CWE-118 | C/C++ | cpp/using-expired-stack-address | Use of expired stack-address |
CWE-118 | C/C++ | cpp/overflow-buffer | Call to memory access function may overflow buffer |
CWE-118 | C/C++ | cpp/overrun-write | Overrunning write |
CWE-118 | C/C++ | cpp/badly-bounded-write | Badly bounded write |
CWE-118 | C/C++ | cpp/overrunning-write | Potentially overrunning write |
CWE-118 | C/C++ | cpp/overrunning-write-with-float | Potentially overrunning write with float to string conversion |
CWE-118 | C/C++ | cpp/unbounded-write | Unbounded write |
CWE-118 | C/C++ | cpp/very-likely-overrunning-write | Likely overrunning write |
CWE-118 | C/C++ | cpp/unterminated-variadic-call | Unterminated variadic call |
CWE-118 | C/C++ | cpp/no-space-for-terminator | No space for zero terminator |
CWE-118 | C/C++ | cpp/invalid-pointer-deref | Invalid pointer dereference |
CWE-118 | C/C++ | cpp/openssl-heartbleed | Use of a version of OpenSSL with Heartbleed |
CWE-118 | C/C++ | cpp/iterator-to-expired-container | Iterator to expired container |
CWE-118 | C/C++ | cpp/use-of-string-after-lifetime-ends | Use of string after lifetime ends |
CWE-118 | C/C++ | cpp/use-of-unique-pointer-after-lifetime-ends | Use of unique pointer after lifetime ends |
CWE-118 | C/C++ | cpp/memory-unsafe-function-scan | Scanf function without a specified length |
CWE-118 | C/C++ | cpp/dangerous-use-convert-function | Dangerous use convert function. |
CWE-118 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-118 | C/C++ | cpp/use-after-expired-lifetime | Use of object after its lifetime has ended |
CWE-118 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-118 | C/C++ | cpp/sign-conversion-pointer-arithmetic | unsigned to signed used in pointer arithmetic |
CWE-118 | C/C++ | cpp/access-memory-location-after-end-buffer-strlen | Access Of Memory Location After End Of Buffer |
CWE-118 | C/C++ | cpp/buffer-access-with-incorrect-length-value | Buffer access with incorrect length value |
CWE-118 | C# | cs/unvalidated-local-pointer-arithmetic | Unvalidated local pointer arithmetic |
CWE-118 | Go | go/wrong-usage-of-unsafe | Wrong usage of package unsafe |
CWE-119 | C/C++ | cpp/offset-use-before-range-check | Array offset used before range check |
CWE-119 | C/C++ | cpp/double-free | Potential double free |
CWE-119 | C/C++ | cpp/late-negative-test | Pointer offset used before it is checked |
CWE-119 | C/C++ | cpp/missing-negativity-test | Unchecked return value used as offset |
CWE-119 | C/C++ | cpp/overflow-calculated | Buffer not sufficient for string |
CWE-119 | C/C++ | cpp/overflow-destination | Copy function using source size |
CWE-119 | C/C++ | cpp/static-buffer-overflow | Static array access may cause overflow |
CWE-119 | C/C++ | cpp/allocation-too-small | Not enough memory allocated for pointer type |
CWE-119 | C/C++ | cpp/suspicious-allocation-size | Not enough memory allocated for array of pointer type |
CWE-119 | C/C++ | cpp/use-after-free | Potential use after free |
CWE-119 | C/C++ | cpp/upcast-array-pointer-arithmetic | Upcast array used in pointer arithmetic |
CWE-119 | C/C++ | cpp/return-stack-allocated-memory | Returning stack-allocated memory |
CWE-119 | C/C++ | cpp/bad-strncpy-size | Possibly wrong buffer size in string copy |
CWE-119 | C/C++ | cpp/unsafe-strncat | Potentially unsafe call to strncat |
CWE-119 | C/C++ | cpp/unsafe-strcat | Potentially unsafe use of strcat |
CWE-119 | C/C++ | cpp/using-expired-stack-address | Use of expired stack-address |
CWE-119 | C/C++ | cpp/overflow-buffer | Call to memory access function may overflow buffer |
CWE-119 | C/C++ | cpp/overrun-write | Overrunning write |
CWE-119 | C/C++ | cpp/badly-bounded-write | Badly bounded write |
CWE-119 | C/C++ | cpp/overrunning-write | Potentially overrunning write |
CWE-119 | C/C++ | cpp/overrunning-write-with-float | Potentially overrunning write with float to string conversion |
CWE-119 | C/C++ | cpp/unbounded-write | Unbounded write |
CWE-119 | C/C++ | cpp/very-likely-overrunning-write | Likely overrunning write |
CWE-119 | C/C++ | cpp/unterminated-variadic-call | Unterminated variadic call |
CWE-119 | C/C++ | cpp/no-space-for-terminator | No space for zero terminator |
CWE-119 | C/C++ | cpp/invalid-pointer-deref | Invalid pointer dereference |
CWE-119 | C/C++ | cpp/openssl-heartbleed | Use of a version of OpenSSL with Heartbleed |
CWE-119 | C/C++ | cpp/iterator-to-expired-container | Iterator to expired container |
CWE-119 | C/C++ | cpp/use-of-string-after-lifetime-ends | Use of string after lifetime ends |
CWE-119 | C/C++ | cpp/use-of-unique-pointer-after-lifetime-ends | Use of unique pointer after lifetime ends |
CWE-119 | C/C++ | cpp/memory-unsafe-function-scan | Scanf function without a specified length |
CWE-119 | C/C++ | cpp/dangerous-use-convert-function | Dangerous use convert function. |
CWE-119 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-119 | C/C++ | cpp/use-after-expired-lifetime | Use of object after its lifetime has ended |
CWE-119 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-119 | C/C++ | cpp/sign-conversion-pointer-arithmetic | unsigned to signed used in pointer arithmetic |
CWE-119 | C/C++ | cpp/access-memory-location-after-end-buffer-strlen | Access Of Memory Location After End Of Buffer |
CWE-119 | C/C++ | cpp/buffer-access-with-incorrect-length-value | Buffer access with incorrect length value |
CWE-119 | C# | cs/unvalidated-local-pointer-arithmetic | Unvalidated local pointer arithmetic |
CWE-119 | Go | go/wrong-usage-of-unsafe | Wrong usage of package unsafe |
CWE-120 | C/C++ | cpp/offset-use-before-range-check | Array offset used before range check |
CWE-120 | C/C++ | cpp/overflow-calculated | Buffer not sufficient for string |
CWE-120 | C/C++ | cpp/unsafe-strcat | Potentially unsafe use of strcat |
CWE-120 | C/C++ | cpp/badly-bounded-write | Badly bounded write |
CWE-120 | C/C++ | cpp/overrunning-write | Potentially overrunning write |
CWE-120 | C/C++ | cpp/overrunning-write-with-float | Potentially overrunning write with float to string conversion |
CWE-120 | C/C++ | cpp/unbounded-write | Unbounded write |
CWE-120 | C/C++ | cpp/very-likely-overrunning-write | Likely overrunning write |
CWE-120 | C/C++ | cpp/no-space-for-terminator | No space for zero terminator |
CWE-120 | C/C++ | cpp/memory-unsafe-function-scan | Scanf function without a specified length |
CWE-120 | C# | cs/unvalidated-local-pointer-arithmetic | Unvalidated local pointer arithmetic |
CWE-121 | C/C++ | cpp/overflow-buffer | Call to memory access function may overflow buffer |
CWE-121 | C/C++ | cpp/unterminated-variadic-call | Unterminated variadic call |
CWE-122 | C/C++ | cpp/allocation-too-small | Not enough memory allocated for pointer type |
CWE-122 | C/C++ | cpp/suspicious-allocation-size | Not enough memory allocated for array of pointer type |
CWE-122 | C/C++ | cpp/overflow-buffer | Call to memory access function may overflow buffer |
CWE-122 | C/C++ | cpp/no-space-for-terminator | No space for zero terminator |
CWE-122 | C# | cs/unvalidated-local-pointer-arithmetic | Unvalidated local pointer arithmetic |
CWE-125 | C/C++ | cpp/offset-use-before-range-check | Array offset used before range check |
CWE-125 | C/C++ | cpp/overflow-buffer | Call to memory access function may overflow buffer |
CWE-125 | C/C++ | cpp/invalid-pointer-deref | Invalid pointer dereference |
CWE-125 | C/C++ | cpp/dangerous-use-convert-function | Dangerous use convert function. |
CWE-125 | Go | go/wrong-usage-of-unsafe | Wrong usage of package unsafe |
CWE-126 | C/C++ | cpp/overflow-buffer | Call to memory access function may overflow buffer |
CWE-126 | Go | go/wrong-usage-of-unsafe | Wrong usage of package unsafe |
CWE-128 | C/C++ | cpp/signed-overflow-check | Signed overflow check |
CWE-128 | C/C++ | cpp/multiplication-overflow-in-alloc | Multiplication result may overflow and be used in allocation |
CWE-129 | C/C++ | cpp/unclear-array-index-validation | Unclear validation of array index |
CWE-129 | Java/Kotlin | java/improper-validation-of-array-construction | Improper validation of user-provided size used for array construction |
CWE-129 | Java/Kotlin | java/improper-validation-of-array-construction-code-specified | Improper validation of code-specified size used for array construction |
CWE-129 | Java/Kotlin | java/improper-validation-of-array-index | Improper validation of user-provided array index |
CWE-129 | Java/Kotlin | java/improper-validation-of-array-index-code-specified | Improper validation of code-specified array index |
CWE-131 | C/C++ | cpp/overflow-calculated | Buffer not sufficient for string |
CWE-131 | C/C++ | cpp/overflow-destination | Copy function using source size |
CWE-131 | C/C++ | cpp/static-buffer-overflow | Static array access may cause overflow |
CWE-131 | C/C++ | cpp/allocation-too-small | Not enough memory allocated for pointer type |
CWE-131 | C/C++ | cpp/suspicious-allocation-size | Not enough memory allocated for array of pointer type |
CWE-131 | C/C++ | cpp/overrun-write | Overrunning write |
CWE-131 | C/C++ | cpp/no-space-for-terminator | No space for zero terminator |
CWE-134 | C/C++ | cpp/non-constant-format | Non-constant format string |
CWE-134 | C/C++ | cpp/tainted-format-string | Uncontrolled format string |
CWE-134 | C# | cs/uncontrolled-format-string | Uncontrolled format string |
CWE-134 | Java/Kotlin | java/tainted-format-string | Use of externally-controlled format string |
CWE-134 | JavaScript/TypeScript | js/tainted-format-string | Use of externally-controlled format string |
CWE-134 | JavaScript/TypeScript | js/tainted-format-string-more-sources | Use of externally-controlled format string with additional heuristic sources |
CWE-134 | Ruby | rb/tainted-format-string | Use of externally-controlled format string |
CWE-134 | Swift | swift/uncontrolled-format-string | Uncontrolled format string |
CWE-135 | Swift | swift/string-length-conflation | String length conflation |
CWE-170 | C/C++ | cpp/improper-null-termination | Potential improper null termination |
CWE-170 | C/C++ | cpp/user-controlled-null-termination-tainted | User-controlled data may not be null terminated |
CWE-172 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-172 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-176 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-176 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-178 | JavaScript/TypeScript | js/case-sensitive-middleware-path | Case-sensitive middleware path |
CWE-179 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-179 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-180 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-180 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-183 | Go | go/cors-misconfiguration | CORS misconfiguration |
CWE-183 | JavaScript/TypeScript | js/angular/insecure-url-whitelist | Insecure URL whitelist |
CWE-183 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-183 | JavaScript/TypeScript | js/cors-misconfiguration | overly CORS configuration |
CWE-183 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-183 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-184 | JavaScript/TypeScript | js/incomplete-url-scheme-check | Incomplete URL scheme check |
CWE-184 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-185 | Java/Kotlin | java/permissive-dot-regex | URL matched by permissive . in a regular expression |
CWE-185 | JavaScript/TypeScript | js/angular/insecure-url-whitelist | Insecure URL whitelist |
CWE-185 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-185 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-185 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-185 | Swift | swift/bad-tag-filter | Bad HTML filtering regexp |
CWE-186 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-186 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-186 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-186 | Swift | swift/bad-tag-filter | Bad HTML filtering regexp |
CWE-190 | C/C++ | cpp/ambiguously-signed-bit-field | Ambiguously signed bit-field member |
CWE-190 | C/C++ | cpp/bad-addition-overflow-check | Bad check for overflow of integer addition |
CWE-190 | C/C++ | cpp/integer-multiplication-cast-to-long | Multiplication result converted to larger type |
CWE-190 | C/C++ | cpp/signed-overflow-check | Signed overflow check |
CWE-190 | C/C++ | cpp/overflowing-snprintf | Potentially overflowing call to snprintf |
CWE-190 | C/C++ | cpp/tainted-arithmetic | User-controlled data in arithmetic expression |
CWE-190 | C/C++ | cpp/uncontrolled-arithmetic | Uncontrolled data in arithmetic expression |
CWE-190 | C/C++ | cpp/arithmetic-with-extreme-values | Use of extreme values in arithmetic expression |
CWE-190 | C/C++ | cpp/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-190 | C/C++ | cpp/integer-overflow-tainted | Potential integer arithmetic overflow |
CWE-190 | C/C++ | cpp/uncontrolled-allocation-size | Uncontrolled allocation size |
CWE-190 | C/C++ | cpp/multiplication-overflow-in-alloc | Multiplication result may overflow and be used in allocation |
CWE-190 | C/C++ | cpp/dangerous-use-of-transformation-after-operation | Dangerous use of transformation after operation. |
CWE-190 | C/C++ | cpp/signed-bit-field | Possible signed bit-field member |
CWE-190 | C# | cs/loss-of-precision | Possible loss of precision |
CWE-190 | Go | go/allocation-size-overflow | Size computation for allocation may overflow |
CWE-190 | Go | go/incorrect-integer-conversion | Incorrect conversion between integer types |
CWE-190 | Java/Kotlin | java/implicit-cast-in-compound-assignment | Implicit narrowing conversion in compound assignment |
CWE-190 | Java/Kotlin | java/integer-multiplication-cast-to-long | Result of multiplication cast to wider type |
CWE-190 | Java/Kotlin | java/tainted-arithmetic | User-controlled data in arithmetic expression |
CWE-190 | Java/Kotlin | java/uncontrolled-arithmetic | Uncontrolled data in arithmetic expression |
CWE-190 | Java/Kotlin | java/extreme-value-arithmetic | Use of extreme values in arithmetic expression |
CWE-190 | Java/Kotlin | java/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-191 | C/C++ | cpp/tainted-arithmetic | User-controlled data in arithmetic expression |
CWE-191 | C/C++ | cpp/uncontrolled-arithmetic | Uncontrolled data in arithmetic expression |
CWE-191 | C/C++ | cpp/arithmetic-with-extreme-values | Use of extreme values in arithmetic expression |
CWE-191 | C/C++ | cpp/unsigned-difference-expression-compared-zero | Unsigned difference expression compared to zero |
CWE-191 | Java/Kotlin | java/tainted-arithmetic | User-controlled data in arithmetic expression |
CWE-191 | Java/Kotlin | java/uncontrolled-arithmetic | Uncontrolled data in arithmetic expression |
CWE-191 | Java/Kotlin | java/extreme-value-arithmetic | Use of extreme values in arithmetic expression |
CWE-193 | C/C++ | cpp/invalid-pointer-deref | Invalid pointer dereference |
CWE-193 | C# | cs/index-out-of-bounds | Off-by-one comparison against container length |
CWE-193 | Go | go/index-out-of-bounds | Off-by-one comparison against length |
CWE-193 | Java/Kotlin | java/index-out-of-bounds | Array index out of bounds |
CWE-193 | JavaScript/TypeScript | js/index-out-of-bounds | Off-by-one comparison against length |
CWE-197 | C/C++ | cpp/integer-multiplication-cast-to-long | Multiplication result converted to larger type |
CWE-197 | C/C++ | cpp/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-197 | C/C++ | cpp/integer-overflow-tainted | Potential integer arithmetic overflow |
CWE-197 | C# | cs/loss-of-precision | Possible loss of precision |
CWE-197 | Go | go/shift-out-of-range | Shift out of range |
CWE-197 | Java/Kotlin | java/implicit-cast-in-compound-assignment | Implicit narrowing conversion in compound assignment |
CWE-197 | Java/Kotlin | java/integer-multiplication-cast-to-long | Result of multiplication cast to wider type |
CWE-197 | Java/Kotlin | java/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-197 | Java/Kotlin | java/tainted-numeric-cast | User-controlled data in numeric cast |
CWE-197 | JavaScript/TypeScript | js/shift-out-of-range | Shift out of range |
CWE-200 | C/C++ | cpp/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-200 | C/C++ | cpp/system-data-exposure | Exposure of system data to an unauthorized control sphere |
CWE-200 | C/C++ | cpp/potential-system-data-exposure | Potential exposure of sensitive system data to an unauthorized control sphere |
CWE-200 | C/C++ | cpp/work-with-file-without-permissions-rights | Writing to a file without setting permissions. |
CWE-200 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-200 | C/C++ | cpp/private-cleartext-write | Exposure of private information |
CWE-200 | C# | cs/web/debug-binary | Creating an ASP.NET debug binary may reveal sensitive information |
CWE-200 | C# | cs/sensitive-data-transmission | Information exposure through transmitted data |
CWE-200 | C# | cs/information-exposure-through-exception | Information exposure through an exception |
CWE-200 | C# | cs/cleartext-storage-of-sensitive-information | Clear text storage of sensitive information |
CWE-200 | C# | cs/exposure-of-sensitive-information | Exposure of private information |
CWE-200 | C# | cs/web/directory-browse-enabled | ASP.NET config file enables directory browsing |
CWE-200 | C# | cs/web/persistent-cookie | Cookie security: persistent cookie |
CWE-200 | Go | go/stack-trace-exposure | Information exposure through a stack trace |
CWE-200 | Go | go/clear-text-logging | Clear-text logging of sensitive information |
CWE-200 | Go | go/timing-attack | Timing attacks due to comparison of sensitive secrets |
CWE-200 | Java/Kotlin | java/android/sensitive-notification | Exposure of sensitive information to notifications |
CWE-200 | Java/Kotlin | java/android/sensitive-text | Exposure of sensitive information to UI text views |
CWE-200 | Java/Kotlin | java/android/websettings-allow-content-access | Android WebView settings allows access to content links |
CWE-200 | Java/Kotlin | java/android/websettings-file-access | Android WebSettings file access |
CWE-200 | Java/Kotlin | java/local-temp-file-or-directory-information-disclosure | Local information disclosure in a temporary directory |
CWE-200 | Java/Kotlin | java/error-message-exposure | Information exposure through an error message |
CWE-200 | Java/Kotlin | java/stack-trace-exposure | Information exposure through a stack trace |
CWE-200 | Java/Kotlin | java/android/sensitive-keyboard-cache | Android sensitive keyboard cache |
CWE-200 | Java/Kotlin | java/sensitive-log | Insertion of sensitive information into log files |
CWE-200 | Java/Kotlin | java/insecure-webview-resource-response | Insecure Android WebView Resource Response |
CWE-200 | Java/Kotlin | java/sensitive-android-file-leak | Leaking sensitive Android file |
CWE-200 | Java/Kotlin | java/possible-timing-attack-against-signature | Possible timing attack against signature validation |
CWE-200 | Java/Kotlin | java/timing-attack-against-headers-value | Timing attack against header value |
CWE-200 | Java/Kotlin | java/timing-attack-against-signature | Timing attack against signature validation |
CWE-200 | Java/Kotlin | java/server-directory-listing | Directories and files exposure |
CWE-200 | Java/Kotlin | java/sensitive-query-with-get | Sensitive GET Query |
CWE-200 | JavaScript/TypeScript | js/unsafe-external-link | Potentially unsafe external link |
CWE-200 | JavaScript/TypeScript | js/file-access-to-http | File data in outbound network request |
CWE-200 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-200 | JavaScript/TypeScript | js/cross-window-information-leak | Cross-window communication with unrestricted target origin |
CWE-200 | JavaScript/TypeScript | js/stack-trace-exposure | Information exposure through a stack trace |
CWE-200 | JavaScript/TypeScript | js/actions/actions-artifact-leak | Storage of sensitive information in GitHub Actions artifact |
CWE-200 | JavaScript/TypeScript | js/build-artifact-leak | Storage of sensitive information in build artifact |
CWE-200 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-200 | JavaScript/TypeScript | js/clear-text-storage-of-sensitive-data | Clear text storage of sensitive information |
CWE-200 | JavaScript/TypeScript | js/sensitive-get-query | Sensitive data read from GET request |
CWE-200 | Python | py/bind-socket-all-network-interfaces | Binding a socket to all network interfaces |
CWE-200 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-200 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-200 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-200 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-200 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-200 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-200 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-200 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-200 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-200 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-200 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-200 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-200 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-200 | Ruby | rb/sensitive-get-query | Sensitive data read from GET request |
CWE-200 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-201 | C# | cs/sensitive-data-transmission | Information exposure through transmitted data |
CWE-201 | JavaScript/TypeScript | js/cross-window-information-leak | Cross-window communication with unrestricted target origin |
CWE-203 | Go | go/timing-attack | Timing attacks due to comparison of sensitive secrets |
CWE-203 | Java/Kotlin | java/possible-timing-attack-against-signature | Possible timing attack against signature validation |
CWE-203 | Java/Kotlin | java/timing-attack-against-headers-value | Timing attack against header value |
CWE-203 | Java/Kotlin | java/timing-attack-against-signature | Timing attack against signature validation |
CWE-203 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-203 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-203 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-203 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-203 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-203 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-208 | Java/Kotlin | java/possible-timing-attack-against-signature | Possible timing attack against signature validation |
CWE-208 | Java/Kotlin | java/timing-attack-against-headers-value | Timing attack against header value |
CWE-208 | Java/Kotlin | java/timing-attack-against-signature | Timing attack against signature validation |
CWE-208 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-208 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-208 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-208 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-208 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-208 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-209 | C# | cs/information-exposure-through-exception | Information exposure through an exception |
CWE-209 | Go | go/stack-trace-exposure | Information exposure through a stack trace |
CWE-209 | Java/Kotlin | java/error-message-exposure | Information exposure through an error message |
CWE-209 | Java/Kotlin | java/stack-trace-exposure | Information exposure through a stack trace |
CWE-209 | JavaScript/TypeScript | js/stack-trace-exposure | Information exposure through a stack trace |
CWE-209 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-209 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-215 | C# | cs/web/debug-binary | Creating an ASP.NET debug binary may reveal sensitive information |
CWE-215 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-216 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-219 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-221 | C# | cs/catch-of-all-exceptions | Generic catch clause |
CWE-221 | C# | cs/web/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-221 | Java/Kotlin | java/overly-general-catch | Overly-general catch clause |
CWE-221 | JavaScript/TypeScript | js/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-221 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-227 | C/C++ | cpp/double-free | Potential double free |
CWE-227 | C/C++ | cpp/incorrectly-checked-scanf | Incorrect return-value check for a 'scanf'-like function |
CWE-227 | C/C++ | cpp/missing-check-scanf | Missing return-value check for a 'scanf'-like function |
CWE-227 | C/C++ | cpp/overflowing-snprintf | Potentially overflowing call to snprintf |
CWE-227 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-227 | C/C++ | cpp/wrong-type-format-argument | Wrong type of arguments to formatting function |
CWE-227 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-227 | C/C++ | cpp/ignore-return-value-sal | SAL requires inspecting return value |
CWE-227 | C/C++ | cpp/hresult-boolean-conversion | Cast between HRESULT and a Boolean type |
CWE-227 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-227 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-227 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-227 | C/C++ | cpp/work-with-changing-working-directories | Find work with changing working directories, with security errors. |
CWE-227 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-227 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-227 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-227 | C/C++ | cpp/double-release | Errors When Double Release |
CWE-227 | C# | cs/inconsistent-equals-and-gethashcode | Inconsistent Equals(object) and GetHashCode() |
CWE-227 | C# | cs/invalid-dynamic-call | Bad dynamic call |
CWE-227 | C# | cs/web/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-227 | Java/Kotlin | java/ejb/container-interference | EJB interferes with container operation |
CWE-227 | Java/Kotlin | java/ejb/file-io | EJB uses file input/output |
CWE-227 | Java/Kotlin | java/ejb/graphics | EJB uses graphics |
CWE-227 | Java/Kotlin | java/ejb/native-code | EJB uses native code |
CWE-227 | Java/Kotlin | java/ejb/reflection | EJB uses reflection |
CWE-227 | Java/Kotlin | java/ejb/security-configuration-access | EJB accesses security configuration |
CWE-227 | Java/Kotlin | java/ejb/substitution-in-serialization | EJB uses substitution in serialization |
CWE-227 | Java/Kotlin | java/ejb/socket-or-stream-handler-factory | EJB sets socket factory or URL stream handler factory |
CWE-227 | Java/Kotlin | java/ejb/server-socket | EJB uses server socket |
CWE-227 | Java/Kotlin | java/ejb/non-final-static-field | EJB uses non-final static field |
CWE-227 | Java/Kotlin | java/ejb/synchronization | EJB uses synchronization |
CWE-227 | Java/Kotlin | java/ejb/this | EJB uses 'this' as argument or result |
CWE-227 | Java/Kotlin | java/ejb/threads | EJB uses threads |
CWE-227 | Java/Kotlin | java/missing-call-to-super-clone | Missing super clone |
CWE-227 | Java/Kotlin | java/inconsistent-equals-and-hashcode | Inconsistent equals and hashCode |
CWE-227 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-227 | Java/Kotlin | java/missing-super-finalize | Finalizer inconsistency |
CWE-227 | Java/Kotlin | java/missing-format-argument | Missing format argument |
CWE-227 | Java/Kotlin | java/unused-format-argument | Unused format argument |
CWE-227 | Java/Kotlin | java/static-initialization-vector | Using a static initialization vector for encryption |
CWE-227 | Java/Kotlin | java/empty-finalizer | Empty body of finalizer |
CWE-227 | JavaScript/TypeScript | js/superfluous-trailing-arguments | Superfluous trailing arguments |
CWE-227 | JavaScript/TypeScript | js/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-227 | Python | py/equals-hash-mismatch | Inconsistent equality and hashing |
CWE-227 | Python | py/call/wrong-named-class-argument | Wrong name for an argument in a class instantiation |
CWE-227 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-227 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-227 | Python | py/call/wrong-named-argument | Wrong name for an argument in a call |
CWE-227 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-227 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-227 | Swift | swift/static-initialization-vector | Static initialization vector for encryption |
CWE-228 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-228 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-233 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-233 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-234 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-234 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-242 | C/C++ | cpp/dangerous-function-overflow | Use of dangerous function |
CWE-243 | C/C++ | cpp/work-with-changing-working-directories | Find work with changing working directories, with security errors. |
CWE-247 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-247 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-248 | C/C++ | cpp/operator-find-incorrectly-used-exceptions | Operator Find Incorrectly Used Exceptions |
CWE-248 | C# | cs/web/missing-global-error-handler | Missing global error handler |
CWE-248 | Java/Kotlin | java/uncaught-number-format-exception | Missing catch of NumberFormatException |
CWE-248 | Java/Kotlin | java/uncaught-servlet-exception | Uncaught Servlet Exception |
CWE-248 | JavaScript/TypeScript | js/server-crash | Server crash |
CWE-250 | JavaScript/TypeScript | js/remote-property-injection | Remote property injection |
CWE-250 | JavaScript/TypeScript | js/remote-property-injection-more-sources | Remote property injection with additional heuristic sources |
CWE-252 | C/C++ | cpp/missing-check-scanf | Missing return-value check for a 'scanf'-like function |
CWE-252 | C/C++ | cpp/return-value-ignored | Return value of a function is ignored |
CWE-252 | C/C++ | cpp/inconsistent-call-on-result | Inconsistent operation on return value |
CWE-252 | C/C++ | cpp/ignore-return-value-sal | SAL requires inspecting return value |
CWE-252 | C/C++ | cpp/incorrect-allocation-error-handling | Incorrect allocation-error handling |
CWE-252 | C/C++ | cpp/work-with-changing-working-directories | Find work with changing working directories, with security errors. |
CWE-252 | C# | cs/unchecked-return-value | Unchecked return value |
CWE-252 | Java/Kotlin | java/inconsistent-call-on-result | Inconsistent operation on return value |
CWE-252 | Java/Kotlin | java/return-value-ignored | Method result ignored |
CWE-252 | Python | py/ignored-return-value | Ignored return value |
CWE-253 | C/C++ | cpp/incorrectly-checked-scanf | Incorrect return-value check for a 'scanf'-like function |
CWE-253 | C/C++ | cpp/missing-check-scanf | Missing return-value check for a 'scanf'-like function |
CWE-253 | C/C++ | cpp/overflowing-snprintf | Potentially overflowing call to snprintf |
CWE-253 | C/C++ | cpp/hresult-boolean-conversion | Cast between HRESULT and a Boolean type |
CWE-256 | C# | cs/password-in-configuration | Password in configuration file |
CWE-256 | Java/Kotlin | java/credentials-in-properties | Cleartext Credentials in Properties File |
CWE-256 | Java/Kotlin | java/password-in-configuration | Password in configuration file |
CWE-256 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-258 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-258 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-259 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-259 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-259 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-259 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-259 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-259 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-259 | Swift | swift/constant-password | Constant password |
CWE-260 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-260 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-260 | C# | cs/password-in-configuration | Password in configuration file |
CWE-260 | Java/Kotlin | java/credentials-in-properties | Cleartext Credentials in Properties File |
CWE-260 | Java/Kotlin | java/password-in-configuration | Password in configuration file |
CWE-260 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-260 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-266 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-266 | Java/Kotlin | java/android/intent-uri-permission-manipulation | Intent URI permission manipulation |
CWE-269 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-269 | C/C++ | cpp/drop-linux-privileges-outoforder | LinuxPrivilegeDroppingOutoforder |
CWE-269 | Java/Kotlin | java/android/intent-uri-permission-manipulation | Intent URI permission manipulation |
CWE-269 | Java/Kotlin | java/unsafe-cert-trust | Unsafe certificate trust |
CWE-269 | JavaScript/TypeScript | js/remote-property-injection | Remote property injection |
CWE-269 | JavaScript/TypeScript | js/remote-property-injection-more-sources | Remote property injection with additional heuristic sources |
CWE-271 | C/C++ | cpp/drop-linux-privileges-outoforder | LinuxPrivilegeDroppingOutoforder |
CWE-271 | Java/Kotlin | java/unsafe-cert-trust | Unsafe certificate trust |
CWE-273 | C/C++ | cpp/drop-linux-privileges-outoforder | LinuxPrivilegeDroppingOutoforder |
CWE-273 | Java/Kotlin | java/unsafe-cert-trust | Unsafe certificate trust |
CWE-284 | C/C++ | cpp/user-controlled-bypass | Authentication bypass by spoofing |
CWE-284 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-284 | C/C++ | cpp/world-writable-file-creation | File created without restricting permissions |
CWE-284 | C/C++ | cpp/open-call-with-mode-argument | File opened with O_CREAT flag but without mode argument |
CWE-284 | C/C++ | cpp/unsafe-dacl-security-descriptor | Setting a DACL to NULL in a SECURITY_DESCRIPTOR |
CWE-284 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-284 | C/C++ | cpp/drop-linux-privileges-outoforder | LinuxPrivilegeDroppingOutoforder |
CWE-284 | C/C++ | cpp/pam-auth-bypass | PAM Authorization bypass |
CWE-284 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-284 | C# | cs/password-in-configuration | Password in configuration file |
CWE-284 | C# | cs/web/missing-function-level-access-control | Missing function level access control |
CWE-284 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-284 | C# | cs/session-reuse | Failure to abandon session |
CWE-284 | C# | cs/web/insecure-direct-object-reference | Insecure Direct Object Reference |
CWE-284 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-284 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-284 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-284 | C# | cs/web/broad-cookie-domain | Cookie security: overly broad domain |
CWE-284 | C# | cs/web/broad-cookie-path | Cookie security: overly broad path |
CWE-284 | Go | go/insecure-hostkeycallback | Use of insecure HostKeyCallback implementation |
CWE-284 | Go | go/email-injection | Email content injection |
CWE-284 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-284 | Go | go/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-284 | Go | go/improper-ldap-auth | Improper LDAP Authentication |
CWE-284 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-284 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-284 | Go | go/cors-misconfiguration | CORS misconfiguration |
CWE-284 | Java/Kotlin | java/local-temp-file-or-directory-information-disclosure | Local information disclosure in a temporary directory |
CWE-284 | Java/Kotlin | java/android/intent-uri-permission-manipulation | Intent URI permission manipulation |
CWE-284 | Java/Kotlin | java/unsafe-cert-trust | Unsafe certificate trust |
CWE-284 | Java/Kotlin | java/android/insecure-local-key-gen | Insecurely generated keys for local authentication |
CWE-284 | Java/Kotlin | java/android/insecure-local-authentication | Insecure local authentication |
CWE-284 | Java/Kotlin | java/insecure-smtp-ssl | Insecure JavaMail SSL Configuration |
CWE-284 | Java/Kotlin | java/unsafe-hostname-verification | Unsafe hostname verification |
CWE-284 | Java/Kotlin | java/socket-auth-race-condition | Race condition in socket authentication |
CWE-284 | Java/Kotlin | java/insecure-basic-auth | Insecure basic authentication |
CWE-284 | Java/Kotlin | java/insecure-ldap-auth | Insecure LDAP authentication |
CWE-284 | Java/Kotlin | java/world-writable-file-read | Reading from a world writable file |
CWE-284 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-284 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-284 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-284 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-284 | Java/Kotlin | java/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-284 | Java/Kotlin | java/tainted-permissions-check | User-controlled data used in permissions check |
CWE-284 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-284 | Java/Kotlin | java/improper-intent-verification | Improper verification of intent by broadcast receiver |
CWE-284 | Java/Kotlin | java/android/incomplete-provider-permissions | Missing read or write permission in a content provider |
CWE-284 | Java/Kotlin | java/android/implicitly-exported-component | Implicitly exported Android component |
CWE-284 | Java/Kotlin | java/android/implicit-pendingintents | Use of implicit PendingIntents |
CWE-284 | Java/Kotlin | java/android/sensitive-communication | Leaking sensitive information through an implicit Intent |
CWE-284 | Java/Kotlin | java/android/sensitive-result-receiver | Leaking sensitive information through a ResultReceiver |
CWE-284 | Java/Kotlin | java/android/intent-redirection | Android Intent redirection |
CWE-284 | Java/Kotlin | java/ignored-hostname-verification | Ignored result of hostname verification |
CWE-284 | Java/Kotlin | java/insecure-ldaps-endpoint | Insecure LDAPS Endpoint Configuration |
CWE-284 | Java/Kotlin | java/unvalidated-cors-origin-set | CORS is derived from untrusted input |
CWE-284 | Java/Kotlin | java/credentials-in-properties | Cleartext Credentials in Properties File |
CWE-284 | Java/Kotlin | java/password-in-configuration | Password in configuration file |
CWE-284 | Java/Kotlin | java/permissive-dot-regex | URL matched by permissive . in a regular expression |
CWE-284 | Java/Kotlin | java/incorrect-url-verification | Incorrect URL verification |
CWE-284 | JavaScript/TypeScript | js/missing-origin-check | Missing origin verification in postMessage handler |
CWE-284 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-284 | JavaScript/TypeScript | js/disabling-certificate-validation | Disabling certificate validation |
CWE-284 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-284 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-284 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-284 | JavaScript/TypeScript | js/session-fixation | Failure to abandon session |
CWE-284 | JavaScript/TypeScript | js/remote-property-injection | Remote property injection |
CWE-284 | JavaScript/TypeScript | js/host-header-forgery-in-email-generation | Host header poisoning in email generation |
CWE-284 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-284 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-284 | JavaScript/TypeScript | js/user-controlled-bypass | User-controlled bypass of security check |
CWE-284 | JavaScript/TypeScript | js/different-kinds-comparison-bypass | Comparison of user-controlled data of different kinds |
CWE-284 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-284 | JavaScript/TypeScript | js/user-controlled-data-decompression | User-controlled file decompression |
CWE-284 | JavaScript/TypeScript | js/cors-misconfiguration | overly CORS configuration |
CWE-284 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-284 | JavaScript/TypeScript | js/remote-property-injection-more-sources | Remote property injection with additional heuristic sources |
CWE-284 | JavaScript/TypeScript | js/user-controlled-bypass-more-sources | User-controlled bypass of security check with additional heuristic sources |
CWE-284 | Python | py/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-284 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-284 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-284 | Python | py/flask-constant-secret-key | Initializing SECRET_KEY of Flask application with Constant value |
CWE-284 | Python | py/improper-ldap-auth | Improper LDAP Authentication |
CWE-284 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-284 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-284 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-284 | Ruby | rb/improper-ldap-auth | Improper LDAP Authentication |
CWE-284 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-284 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-284 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-284 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-284 | Swift | swift/constant-password | Constant password |
CWE-284 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-285 | C/C++ | cpp/world-writable-file-creation | File created without restricting permissions |
CWE-285 | C/C++ | cpp/open-call-with-mode-argument | File opened with O_CREAT flag but without mode argument |
CWE-285 | C/C++ | cpp/unsafe-dacl-security-descriptor | Setting a DACL to NULL in a SECURITY_DESCRIPTOR |
CWE-285 | C/C++ | cpp/pam-auth-bypass | PAM Authorization bypass |
CWE-285 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-285 | C# | cs/web/missing-function-level-access-control | Missing function level access control |
CWE-285 | C# | cs/web/insecure-direct-object-reference | Insecure Direct Object Reference |
CWE-285 | Go | go/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-285 | Java/Kotlin | java/local-temp-file-or-directory-information-disclosure | Local information disclosure in a temporary directory |
CWE-285 | Java/Kotlin | java/android/intent-uri-permission-manipulation | Intent URI permission manipulation |
CWE-285 | Java/Kotlin | java/world-writable-file-read | Reading from a world writable file |
CWE-285 | Java/Kotlin | java/android/incomplete-provider-permissions | Missing read or write permission in a content provider |
CWE-285 | Java/Kotlin | java/android/implicitly-exported-component | Implicitly exported Android component |
CWE-285 | Java/Kotlin | java/android/implicit-pendingintents | Use of implicit PendingIntents |
CWE-285 | Java/Kotlin | java/android/sensitive-communication | Leaking sensitive information through an implicit Intent |
CWE-285 | Java/Kotlin | java/android/sensitive-result-receiver | Leaking sensitive information through a ResultReceiver |
CWE-285 | Java/Kotlin | java/android/intent-redirection | Android Intent redirection |
CWE-285 | Java/Kotlin | java/permissive-dot-regex | URL matched by permissive . in a regular expression |
CWE-285 | Java/Kotlin | java/incorrect-url-verification | Incorrect URL verification |
CWE-285 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-285 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-285 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-285 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-285 | Python | py/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-285 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-285 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-285 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-287 | C/C++ | cpp/user-controlled-bypass | Authentication bypass by spoofing |
CWE-287 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-287 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-287 | C# | cs/password-in-configuration | Password in configuration file |
CWE-287 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-287 | C# | cs/session-reuse | Failure to abandon session |
CWE-287 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-287 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-287 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-287 | C# | cs/web/broad-cookie-domain | Cookie security: overly broad domain |
CWE-287 | C# | cs/web/broad-cookie-path | Cookie security: overly broad path |
CWE-287 | Go | go/email-injection | Email content injection |
CWE-287 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-287 | Go | go/improper-ldap-auth | Improper LDAP Authentication |
CWE-287 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-287 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-287 | Java/Kotlin | java/android/insecure-local-key-gen | Insecurely generated keys for local authentication |
CWE-287 | Java/Kotlin | java/android/insecure-local-authentication | Insecure local authentication |
CWE-287 | Java/Kotlin | java/insecure-basic-auth | Insecure basic authentication |
CWE-287 | Java/Kotlin | java/insecure-ldap-auth | Insecure LDAP authentication |
CWE-287 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-287 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-287 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-287 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-287 | Java/Kotlin | java/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-287 | Java/Kotlin | java/tainted-permissions-check | User-controlled data used in permissions check |
CWE-287 | Java/Kotlin | java/credentials-in-properties | Cleartext Credentials in Properties File |
CWE-287 | Java/Kotlin | java/password-in-configuration | Password in configuration file |
CWE-287 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-287 | JavaScript/TypeScript | js/session-fixation | Failure to abandon session |
CWE-287 | JavaScript/TypeScript | js/host-header-forgery-in-email-generation | Host header poisoning in email generation |
CWE-287 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-287 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-287 | JavaScript/TypeScript | js/user-controlled-bypass | User-controlled bypass of security check |
CWE-287 | JavaScript/TypeScript | js/different-kinds-comparison-bypass | Comparison of user-controlled data of different kinds |
CWE-287 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-287 | JavaScript/TypeScript | js/user-controlled-data-decompression | User-controlled file decompression |
CWE-287 | JavaScript/TypeScript | js/user-controlled-bypass-more-sources | User-controlled bypass of security check with additional heuristic sources |
CWE-287 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-287 | Python | py/flask-constant-secret-key | Initializing SECRET_KEY of Flask application with Constant value |
CWE-287 | Python | py/improper-ldap-auth | Improper LDAP Authentication |
CWE-287 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-287 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-287 | Ruby | rb/improper-ldap-auth | Improper LDAP Authentication |
CWE-287 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-287 | Swift | swift/constant-password | Constant password |
CWE-287 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-290 | C/C++ | cpp/user-controlled-bypass | Authentication bypass by spoofing |
CWE-290 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-290 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-290 | Java/Kotlin | java/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-290 | Java/Kotlin | java/tainted-permissions-check | User-controlled data used in permissions check |
CWE-290 | JavaScript/TypeScript | js/user-controlled-bypass | User-controlled bypass of security check |
CWE-290 | JavaScript/TypeScript | js/different-kinds-comparison-bypass | Comparison of user-controlled data of different kinds |
CWE-290 | JavaScript/TypeScript | js/user-controlled-bypass-more-sources | User-controlled bypass of security check with additional heuristic sources |
CWE-290 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-295 | C/C++ | cpp/certificate-result-conflation | Certificate result conflation |
CWE-295 | C/C++ | cpp/certificate-not-checked | Certificate not checked |
CWE-295 | C/C++ | cpp/curl-disabled-ssl | Disabled certifcate verification |
CWE-295 | Go | go/disabled-certificate-check | Disabled TLS certificate check |
CWE-295 | Java/Kotlin | java/android/missing-certificate-pinning | Android missing certificate pinning |
CWE-295 | Java/Kotlin | java/improper-webview-certificate-validation | Android WebView that accepts all certificates |
CWE-295 | Java/Kotlin | java/insecure-trustmanager | TrustManager that accepts all certificates |
CWE-295 | Java/Kotlin | java/insecure-smtp-ssl | Insecure JavaMail SSL Configuration |
CWE-295 | Java/Kotlin | java/unsafe-hostname-verification | Unsafe hostname verification |
CWE-295 | Java/Kotlin | java/jxbrowser/disabled-certificate-validation | JxBrowser with disabled certificate validation |
CWE-295 | Java/Kotlin | java/ignored-hostname-verification | Ignored result of hostname verification |
CWE-295 | Java/Kotlin | java/insecure-ldaps-endpoint | Insecure LDAPS Endpoint Configuration |
CWE-295 | Java/Kotlin | java/disabled-certificate-revocation-checking | Disabled certificate revocation checking |
CWE-295 | JavaScript/TypeScript | js/disabling-certificate-validation | Disabling certificate validation |
CWE-295 | Python | py/paramiko-missing-host-key-validation | Accepting unknown SSH host keys when using Paramiko |
CWE-295 | Python | py/request-without-cert-validation | Request without certificate validation |
CWE-295 | Ruby | rb/request-without-cert-validation | Request without certificate validation |
CWE-297 | Java/Kotlin | java/insecure-smtp-ssl | Insecure JavaMail SSL Configuration |
CWE-297 | Java/Kotlin | java/unsafe-hostname-verification | Unsafe hostname verification |
CWE-297 | Java/Kotlin | java/ignored-hostname-verification | Ignored result of hostname verification |
CWE-297 | Java/Kotlin | java/insecure-ldaps-endpoint | Insecure LDAPS Endpoint Configuration |
CWE-297 | JavaScript/TypeScript | js/disabling-certificate-validation | Disabling certificate validation |
CWE-299 | Java/Kotlin | java/disabled-certificate-revocation-checking | Disabled certificate revocation checking |
CWE-300 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-300 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-300 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-307 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-311 | C/C++ | cpp/cleartext-storage-buffer | Cleartext storage of sensitive information in buffer |
CWE-311 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-311 | C/C++ | cpp/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-311 | C/C++ | cpp/cleartext-storage-database | Cleartext storage of sensitive information in an SQLite database |
CWE-311 | C/C++ | cpp/non-https-url | Failure to use HTTPS URLs |
CWE-311 | C# | cs/password-in-configuration | Password in configuration file |
CWE-311 | C# | cs/cleartext-storage-of-sensitive-information | Clear text storage of sensitive information |
CWE-311 | C# | cs/web/requiressl-not-set | 'requireSSL' attribute is not set to true |
CWE-311 | C# | cs/web/cookie-secure-not-set | 'Secure' attribute is not set to true |
CWE-311 | Go | go/clear-text-logging | Clear-text logging of sensitive information |
CWE-311 | Java/Kotlin | java/android/backup-enabled | Application backup allowed |
CWE-311 | Java/Kotlin | java/android/cleartext-storage-database | Cleartext storage of sensitive information using a local database on Android |
CWE-311 | Java/Kotlin | java/android/cleartext-storage-filesystem | Cleartext storage of sensitive information in the Android filesystem |
CWE-311 | Java/Kotlin | java/cleartext-storage-in-class | Cleartext storage of sensitive information using storable class |
CWE-311 | Java/Kotlin | java/cleartext-storage-in-cookie | Cleartext storage of sensitive information in cookie |
CWE-311 | Java/Kotlin | java/cleartext-storage-in-properties | Cleartext storage of sensitive information using 'Properties' class |
CWE-311 | Java/Kotlin | java/android/cleartext-storage-shared-prefs | Cleartext storage of sensitive information using SharedPreferences on Android |
CWE-311 | Java/Kotlin | java/non-https-url | Failure to use HTTPS URLs |
CWE-311 | Java/Kotlin | java/non-ssl-connection | Failure to use SSL |
CWE-311 | Java/Kotlin | java/non-ssl-socket-factory | Failure to use SSL socket factories |
CWE-311 | Java/Kotlin | java/insecure-basic-auth | Insecure basic authentication |
CWE-311 | Java/Kotlin | java/insecure-ldap-auth | Insecure LDAP authentication |
CWE-311 | Java/Kotlin | java/insecure-cookie | Failure to use secure cookies |
CWE-311 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-311 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-311 | JavaScript/TypeScript | js/actions/actions-artifact-leak | Storage of sensitive information in GitHub Actions artifact |
CWE-311 | JavaScript/TypeScript | js/build-artifact-leak | Storage of sensitive information in build artifact |
CWE-311 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-311 | JavaScript/TypeScript | js/clear-text-storage-of-sensitive-data | Clear text storage of sensitive information |
CWE-311 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-311 | JavaScript/TypeScript | js/clear-text-cookie | Clear text transmission of sensitive cookie |
CWE-311 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-311 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-311 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-311 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-311 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-311 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-311 | Swift | swift/cleartext-storage-database | Cleartext storage of sensitive information in a local database |
CWE-311 | Swift | swift/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-311 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-311 | Swift | swift/cleartext-storage-preferences | Cleartext storage of sensitive information in an application preference store |
CWE-312 | C/C++ | cpp/cleartext-storage-buffer | Cleartext storage of sensitive information in buffer |
CWE-312 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-312 | C/C++ | cpp/cleartext-storage-database | Cleartext storage of sensitive information in an SQLite database |
CWE-312 | C# | cs/password-in-configuration | Password in configuration file |
CWE-312 | C# | cs/cleartext-storage-of-sensitive-information | Clear text storage of sensitive information |
CWE-312 | Go | go/clear-text-logging | Clear-text logging of sensitive information |
CWE-312 | Java/Kotlin | java/android/backup-enabled | Application backup allowed |
CWE-312 | Java/Kotlin | java/android/cleartext-storage-database | Cleartext storage of sensitive information using a local database on Android |
CWE-312 | Java/Kotlin | java/android/cleartext-storage-filesystem | Cleartext storage of sensitive information in the Android filesystem |
CWE-312 | Java/Kotlin | java/cleartext-storage-in-class | Cleartext storage of sensitive information using storable class |
CWE-312 | Java/Kotlin | java/cleartext-storage-in-cookie | Cleartext storage of sensitive information in cookie |
CWE-312 | Java/Kotlin | java/cleartext-storage-in-properties | Cleartext storage of sensitive information using 'Properties' class |
CWE-312 | Java/Kotlin | java/android/cleartext-storage-shared-prefs | Cleartext storage of sensitive information using SharedPreferences on Android |
CWE-312 | JavaScript/TypeScript | js/actions/actions-artifact-leak | Storage of sensitive information in GitHub Actions artifact |
CWE-312 | JavaScript/TypeScript | js/build-artifact-leak | Storage of sensitive information in build artifact |
CWE-312 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-312 | JavaScript/TypeScript | js/clear-text-storage-of-sensitive-data | Clear text storage of sensitive information |
CWE-312 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-312 | JavaScript/TypeScript | js/clear-text-cookie | Clear text transmission of sensitive cookie |
CWE-312 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-312 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-312 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-312 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-312 | Swift | swift/cleartext-storage-database | Cleartext storage of sensitive information in a local database |
CWE-312 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-312 | Swift | swift/cleartext-storage-preferences | Cleartext storage of sensitive information in an application preference store |
CWE-313 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-313 | C/C++ | cpp/cleartext-storage-database | Cleartext storage of sensitive information in an SQLite database |
CWE-313 | C# | cs/password-in-configuration | Password in configuration file |
CWE-313 | Java/Kotlin | java/cleartext-storage-in-properties | Cleartext storage of sensitive information using 'Properties' class |
CWE-313 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-315 | C# | cs/cleartext-storage-of-sensitive-information | Clear text storage of sensitive information |
CWE-315 | Go | go/clear-text-logging | Clear-text logging of sensitive information |
CWE-315 | Java/Kotlin | java/cleartext-storage-in-cookie | Cleartext storage of sensitive information in cookie |
CWE-315 | JavaScript/TypeScript | js/actions/actions-artifact-leak | Storage of sensitive information in GitHub Actions artifact |
CWE-315 | JavaScript/TypeScript | js/build-artifact-leak | Storage of sensitive information in build artifact |
CWE-315 | JavaScript/TypeScript | js/clear-text-storage-of-sensitive-data | Clear text storage of sensitive information |
CWE-315 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-319 | C/C++ | cpp/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-319 | C/C++ | cpp/non-https-url | Failure to use HTTPS URLs |
CWE-319 | C# | cs/web/requiressl-not-set | 'requireSSL' attribute is not set to true |
CWE-319 | C# | cs/web/cookie-secure-not-set | 'Secure' attribute is not set to true |
CWE-319 | Java/Kotlin | java/non-https-url | Failure to use HTTPS URLs |
CWE-319 | Java/Kotlin | java/non-ssl-connection | Failure to use SSL |
CWE-319 | Java/Kotlin | java/non-ssl-socket-factory | Failure to use SSL socket factories |
CWE-319 | Java/Kotlin | java/insecure-basic-auth | Insecure basic authentication |
CWE-319 | Java/Kotlin | java/insecure-ldap-auth | Insecure LDAP authentication |
CWE-319 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-319 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-319 | JavaScript/TypeScript | js/clear-text-cookie | Clear text transmission of sensitive cookie |
CWE-319 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-319 | Swift | swift/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-321 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-321 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-321 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-321 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-321 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-321 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-321 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-321 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-321 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-322 | Go | go/insecure-hostkeycallback | Use of insecure HostKeyCallback implementation |
CWE-326 | C/C++ | cpp/boost/tls-settings-misconfiguration | boost::asio TLS settings misconfiguration |
CWE-326 | C/C++ | cpp/insufficient-key-size | Use of a cryptographic algorithm with insufficient key size |
CWE-326 | C/C++ | cpp/unknown-asymmetric-key-gen-size | Unknown key generation key size |
CWE-326 | C/C++ | cpp/weak-asymmetric-key-gen-size | Weak asymmetric key generation key size (< 2048 bits) |
CWE-326 | C# | cs/insufficient-key-size | Weak encryption: Insufficient key size |
CWE-326 | Go | go/weak-crypto-key | Use of a weak cryptographic key |
CWE-326 | Go | go/weak-crypto-algorithm | Use of a weak cryptographic algorithm |
CWE-326 | Java/Kotlin | java/insufficient-key-size | Use of a cryptographic algorithm with insufficient key size |
CWE-326 | Java/Kotlin | java/weak-cryptographic-algorithm | Use of a broken or risky cryptographic algorithm |
CWE-326 | Java/Kotlin | java/potentially-weak-cryptographic-algorithm | Use of a potentially broken or risky cryptographic algorithm |
CWE-326 | JavaScript/TypeScript | js/insufficient-key-size | Use of a weak cryptographic key |
CWE-326 | JavaScript/TypeScript | js/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-326 | Python | py/weak-crypto-key | Use of weak cryptographic key |
CWE-326 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-326 | Python | py/unknown-asymmetric-key-gen-size | Unknown key generation key size |
CWE-326 | Python | py/weak-asymmetric-key-gen-size | Weak key generation key size (< 2048 bits) |
CWE-326 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-326 | Swift | swift/weak-password-hashing | Use of an inappropriate cryptographic hashing algorithm on passwords |
CWE-326 | Swift | swift/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-327 | C/C++ | cpp/boost/use-of-deprecated-hardcoded-security-protocol | boost::asio use of deprecated hardcoded protocol |
CWE-327 | C/C++ | cpp/weak-cryptographic-algorithm | Use of a broken or risky cryptographic algorithm |
CWE-327 | C/C++ | cpp/openssl-heartbleed | Use of a version of OpenSSL with Heartbleed |
CWE-327 | C/C++ | cpp/weak-block-mode | Weak block mode |
CWE-327 | C/C++ | cpp/weak-elliptic-curve | Weak elliptic curve |
CWE-327 | C/C++ | cpp/weak-crypto/banned-encryption-algorithms | Weak cryptography |
CWE-327 | C/C++ | cpp/weak-crypto/banned-hash-algorithms | Weak cryptography |
CWE-327 | C# | cs/adding-cert-to-root-store | Do not add certificates to the system root store. |
CWE-327 | C# | cs/insecure-sql-connection | Insecure SQL connection |
CWE-327 | C# | cs/ecb-encryption | Encryption using ECB |
CWE-327 | C# | cs/inadequate-rsa-padding | Weak encryption: inadequate RSA padding |
CWE-327 | C# | cs/weak-encryption | Weak encryption |
CWE-327 | C# | cs/azure-storage/unsafe-usage-of-client-side-encryption-version | Unsafe usage of v1 version of Azure Storage client-side encryption (CVE-2022-30187). |
CWE-327 | C# | cs/hash-without-salt | Use of a hash function without a salt |
CWE-327 | Go | go/insecure-tls | Insecure TLS configuration |
CWE-327 | Go | go/weak-crypto-algorithm | Use of a weak cryptographic algorithm |
CWE-327 | Java/Kotlin | java/weak-cryptographic-algorithm | Use of a broken or risky cryptographic algorithm |
CWE-327 | Java/Kotlin | java/potentially-weak-cryptographic-algorithm | Use of a potentially broken or risky cryptographic algorithm |
CWE-327 | Java/Kotlin | java/rsa-without-oaep | Use of RSA algorithm without OAEP |
CWE-327 | Java/Kotlin | java/azure-storage/unsafe-client-side-encryption-in-use | Unsafe usage of v1 version of Azure Storage client-side encryption (CVE-2022-30187). |
CWE-327 | Java/Kotlin | java/unsafe-tls-version | Unsafe TLS version |
CWE-327 | Java/Kotlin | java/hash-without-salt | Use of a hash function without a salt |
CWE-327 | JavaScript/TypeScript | js/biased-cryptographic-random | Creating biased random numbers from a cryptographically secure source |
CWE-327 | JavaScript/TypeScript | js/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-327 | JavaScript/TypeScript | js/insufficient-password-hash | Use of password hash with insufficient computational effort |
CWE-327 | Python | py/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-327 | Python | py/insecure-default-protocol | Default version of SSL/TLS may be insecure |
CWE-327 | Python | py/insecure-protocol | Use of insecure SSL/TLS version |
CWE-327 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-327 | Python | py/azure-storage/unsafe-client-side-encryption-in-use | Unsafe usage of v1 version of Azure Storage client-side encryption. |
CWE-327 | Python | py/weak-block-mode | Weak block mode |
CWE-327 | Python | py/weak-elliptic-curve | Weak elliptic curve |
CWE-327 | Python | py/weak-hashes | Weak hashes |
CWE-327 | Python | py/weak-symmetric-encryption | Weak symmetric encryption algorithm |
CWE-327 | Ruby | rb/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-327 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-327 | Swift | swift/ecb-encryption | Encryption using ECB |
CWE-327 | Swift | swift/weak-password-hashing | Use of an inappropriate cryptographic hashing algorithm on passwords |
CWE-327 | Swift | swift/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-327 | Swift | swift/constant-salt | Use of constant salts |
CWE-327 | Swift | swift/insufficient-hash-iterations | Insufficient hash iterations |
CWE-328 | Go | go/weak-crypto-algorithm | Use of a weak cryptographic algorithm |
CWE-328 | Java/Kotlin | java/weak-cryptographic-algorithm | Use of a broken or risky cryptographic algorithm |
CWE-328 | Java/Kotlin | java/potentially-weak-cryptographic-algorithm | Use of a potentially broken or risky cryptographic algorithm |
CWE-328 | JavaScript/TypeScript | js/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-328 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-328 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-328 | Swift | swift/weak-password-hashing | Use of an inappropriate cryptographic hashing algorithm on passwords |
CWE-328 | Swift | swift/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-329 | Java/Kotlin | java/static-initialization-vector | Using a static initialization vector for encryption |
CWE-329 | Swift | swift/static-initialization-vector | Static initialization vector for encryption |
CWE-330 | C# | cs/random-used-once | Random used only once |
CWE-330 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-330 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-330 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-330 | C# | cs/insecure-randomness | Insecure randomness |
CWE-330 | Go | go/insecure-randomness | Use of insufficient randomness as the key of a cryptographic algorithm |
CWE-330 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-330 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-330 | Java/Kotlin | java/random-used-once | Random used only once |
CWE-330 | Java/Kotlin | java/static-initialization-vector | Using a static initialization vector for encryption |
CWE-330 | Java/Kotlin | java/insecure-randomness | Insecure randomness |
CWE-330 | Java/Kotlin | java/predictable-seed | Use of a predictable seed in a secure random number generator |
CWE-330 | Java/Kotlin | java/jhipster-prng | Detect JHipster Generator Vulnerability CVE-2019-16303 |
CWE-330 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-330 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-330 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-330 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-330 | JavaScript/TypeScript | js/insecure-randomness | Insecure randomness |
CWE-330 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-330 | JavaScript/TypeScript | js/predictable-token | Predictable token |
CWE-330 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-330 | Python | py/insecure-randomness | Insecure randomness |
CWE-330 | Python | py/predictable-token | Predictable token |
CWE-330 | Ruby | rb/insecure-randomness | Insecure randomness |
CWE-330 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-330 | Swift | swift/static-initialization-vector | Static initialization vector for encryption |
CWE-330 | Swift | swift/constant-password | Constant password |
CWE-330 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-335 | C# | cs/random-used-once | Random used only once |
CWE-335 | Java/Kotlin | java/random-used-once | Random used only once |
CWE-335 | Java/Kotlin | java/predictable-seed | Use of a predictable seed in a secure random number generator |
CWE-337 | Java/Kotlin | java/predictable-seed | Use of a predictable seed in a secure random number generator |
CWE-338 | C# | cs/insecure-randomness | Insecure randomness |
CWE-338 | Go | go/insecure-randomness | Use of insufficient randomness as the key of a cryptographic algorithm |
CWE-338 | Java/Kotlin | java/insecure-randomness | Insecure randomness |
CWE-338 | Java/Kotlin | java/jhipster-prng | Detect JHipster Generator Vulnerability CVE-2019-16303 |
CWE-338 | JavaScript/TypeScript | js/insecure-randomness | Insecure randomness |
CWE-338 | Python | py/insecure-randomness | Insecure randomness |
CWE-338 | Ruby | rb/insecure-randomness | Insecure randomness |
CWE-340 | JavaScript/TypeScript | js/predictable-token | Predictable token |
CWE-340 | Python | py/predictable-token | Predictable token |
CWE-344 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-344 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-344 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-344 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-344 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-344 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-344 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-344 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-344 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-344 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-344 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-344 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-344 | Swift | swift/constant-password | Constant password |
CWE-344 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-345 | C/C++ | cpp/non-https-url | Failure to use HTTPS URLs |
CWE-345 | C# | cs/web/ambiguous-client-variable | Value shadowing |
CWE-345 | C# | cs/web/ambiguous-server-variable | Value shadowing: server variable |
CWE-345 | C# | cs/web/missing-token-validation | Missing cross-site request forgery token validation |
CWE-345 | Go | go/missing-jwt-signature-check | Missing JWT signature check |
CWE-345 | Go | go/constant-oauth2-state | Use of constant state value in OAuth 2.0 URL |
CWE-345 | Go | go/cors-misconfiguration | CORS misconfiguration |
CWE-345 | Java/Kotlin | java/non-https-url | Failure to use HTTPS URLs |
CWE-345 | Java/Kotlin | java/missing-jwt-signature-check | Missing JWT signature check |
CWE-345 | Java/Kotlin | java/spring-disabled-csrf-protection | Disabled Spring CSRF protection |
CWE-345 | Java/Kotlin | java/unvalidated-cors-origin-set | CORS is derived from untrusted input |
CWE-345 | Java/Kotlin | java/missing-jwt-signature-check-auth0 | Missing JWT signature check |
CWE-345 | Java/Kotlin | java/ip-address-spoofing | IP address spoofing |
CWE-345 | Java/Kotlin | java/jsonp-injection | JSONP Injection |
CWE-345 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-345 | JavaScript/TypeScript | js/jwt-missing-verification | JWT missing secret or public key verification |
CWE-345 | JavaScript/TypeScript | js/missing-token-validation | Missing CSRF middleware |
CWE-345 | JavaScript/TypeScript | js/decode-jwt-without-verification | JWT missing secret or public key verification |
CWE-345 | JavaScript/TypeScript | js/decode-jwt-without-verification-local-source | JWT missing secret or public key verification |
CWE-345 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-345 | Python | py/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-345 | Python | py/jwt-missing-verification | JWT missing secret or public key verification |
CWE-345 | Python | py/ip-address-spoofing | IP address spoofing |
CWE-345 | Ruby | rb/jwt-missing-verification | JWT missing secret or public key verification |
CWE-345 | Ruby | rb/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-345 | Ruby | rb/csrf-protection-not-enabled | CSRF protection not enabled |
CWE-346 | Go | go/cors-misconfiguration | CORS misconfiguration |
CWE-346 | Java/Kotlin | java/unvalidated-cors-origin-set | CORS is derived from untrusted input |
CWE-346 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-346 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-347 | Go | go/missing-jwt-signature-check | Missing JWT signature check |
CWE-347 | Java/Kotlin | java/missing-jwt-signature-check | Missing JWT signature check |
CWE-347 | Java/Kotlin | java/missing-jwt-signature-check-auth0 | Missing JWT signature check |
CWE-347 | JavaScript/TypeScript | js/jwt-missing-verification | JWT missing secret or public key verification |
CWE-347 | JavaScript/TypeScript | js/decode-jwt-without-verification | JWT missing secret or public key verification |
CWE-347 | JavaScript/TypeScript | js/decode-jwt-without-verification-local-source | JWT missing secret or public key verification |
CWE-347 | Python | py/jwt-missing-verification | JWT missing secret or public key verification |
CWE-347 | Ruby | rb/jwt-missing-verification | JWT missing secret or public key verification |
CWE-348 | C# | cs/web/ambiguous-client-variable | Value shadowing |
CWE-348 | C# | cs/web/ambiguous-server-variable | Value shadowing: server variable |
CWE-348 | Java/Kotlin | java/ip-address-spoofing | IP address spoofing |
CWE-348 | Python | py/ip-address-spoofing | IP address spoofing |
CWE-350 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-350 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-352 | C# | cs/web/missing-token-validation | Missing cross-site request forgery token validation |
CWE-352 | Go | go/constant-oauth2-state | Use of constant state value in OAuth 2.0 URL |
CWE-352 | Java/Kotlin | java/spring-disabled-csrf-protection | Disabled Spring CSRF protection |
CWE-352 | Java/Kotlin | java/jsonp-injection | JSONP Injection |
CWE-352 | JavaScript/TypeScript | js/missing-token-validation | Missing CSRF middleware |
CWE-352 | Python | py/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-352 | Ruby | rb/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-352 | Ruby | rb/csrf-protection-not-enabled | CSRF protection not enabled |
CWE-359 | C/C++ | cpp/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-359 | C/C++ | cpp/private-cleartext-write | Exposure of private information |
CWE-359 | C# | cs/cleartext-storage-of-sensitive-information | Clear text storage of sensitive information |
CWE-359 | C# | cs/exposure-of-sensitive-information | Exposure of private information |
CWE-359 | Go | go/clear-text-logging | Clear-text logging of sensitive information |
CWE-359 | JavaScript/TypeScript | js/cross-window-information-leak | Cross-window communication with unrestricted target origin |
CWE-359 | JavaScript/TypeScript | js/actions/actions-artifact-leak | Storage of sensitive information in GitHub Actions artifact |
CWE-359 | JavaScript/TypeScript | js/build-artifact-leak | Storage of sensitive information in build artifact |
CWE-359 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-359 | JavaScript/TypeScript | js/clear-text-storage-of-sensitive-data | Clear text storage of sensitive information |
CWE-359 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-359 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-359 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-359 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-359 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-362 | C/C++ | cpp/toctou-race-condition | Time-of-check time-of-use filesystem race condition |
CWE-362 | C/C++ | cpp/linux-kernel-double-fetch-vulnerability | Linux kernel double-fetch vulnerability detection |
CWE-362 | C# | cs/unsafe-sync-on-field | Futile synchronization on field |
CWE-362 | C# | cs/unsynchronized-static-access | Unsynchronized access to static collection member in non-static context |
CWE-362 | C# | cs/thread-unsafe-icryptotransform-field-in-class | Thread-unsafe use of a static ICryptoTransform field |
CWE-362 | C# | cs/thread-unsafe-icryptotransform-captured-in-lambda | Thread-unsafe capturing of an ICryptoTransform object |
CWE-362 | Java/Kotlin | java/toctou-race-condition | Time-of-check time-of-use race condition |
CWE-362 | Java/Kotlin | java/socket-auth-race-condition | Race condition in socket authentication |
CWE-362 | JavaScript/TypeScript | js/file-system-race | Potential file system race condition |
CWE-366 | C# | cs/unsafe-sync-on-field | Futile synchronization on field |
CWE-367 | C/C++ | cpp/toctou-race-condition | Time-of-check time-of-use filesystem race condition |
CWE-367 | Java/Kotlin | java/toctou-race-condition | Time-of-check time-of-use race condition |
CWE-367 | JavaScript/TypeScript | js/file-system-race | Potential file system race condition |
CWE-369 | C/C++ | cpp/divide-by-zero-using-return-value | Divide by zero using return value |
CWE-369 | Go | go/divide-by-zero | Divide by zero |
CWE-377 | C/C++ | cpp/insecure-generation-of-filename | Insecure generation of filenames. |
CWE-377 | JavaScript/TypeScript | js/insecure-temporary-file | Insecure temporary file |
CWE-377 | Python | py/insecure-temporary-file | Insecure temporary file |
CWE-378 | JavaScript/TypeScript | js/insecure-temporary-file | Insecure temporary file |
CWE-382 | Java/Kotlin | java/ejb/container-interference | EJB interferes with container operation |
CWE-382 | Java/Kotlin | java/jvm-exit | Forcible JVM termination |
CWE-383 | Java/Kotlin | java/ejb/threads | EJB uses threads |
CWE-384 | C# | cs/session-reuse | Failure to abandon session |
CWE-384 | JavaScript/TypeScript | js/session-fixation | Failure to abandon session |
CWE-390 | C/C++ | cpp/operator-find-incorrectly-used-exceptions | Operator Find Incorrectly Used Exceptions |
CWE-390 | C# | cs/empty-catch-block | Poor error handling: empty catch block |
CWE-390 | Python | py/empty-except | Empty except |
CWE-391 | C# | cs/empty-catch-block | Poor error handling: empty catch block |
CWE-391 | Java/Kotlin | java/discarded-exception | Discarded exception |
CWE-391 | Java/Kotlin | java/ignored-error-status-of-call | Ignored error status of call |
CWE-395 | C# | cs/catch-nullreferenceexception | Poor error handling: catch of NullReferenceException |
CWE-396 | C# | cs/catch-of-all-exceptions | Generic catch clause |
CWE-396 | Java/Kotlin | java/overly-general-catch | Overly-general catch clause |
CWE-396 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-398 | C/C++ | cpp/unused-local-variable | Unused local variable |
CWE-398 | C/C++ | cpp/unused-static-function | Unused static function |
CWE-398 | C/C++ | cpp/unused-static-variable | Unused static variable |
CWE-398 | C/C++ | cpp/dead-code-condition | Branching condition always evaluates to same value |
CWE-398 | C/C++ | cpp/dead-code-function | Function is never called |
CWE-398 | C/C++ | cpp/dead-code-goto | Dead code due to goto or break statement |
CWE-398 | C/C++ | cpp/inconsistent-nullness-testing | Inconsistent null check of pointer |
CWE-398 | C/C++ | cpp/missing-null-test | Returned pointer not checked |
CWE-398 | C/C++ | cpp/unused-variable | Variable is assigned a value that is never read |
CWE-398 | C/C++ | cpp/fixme-comment | FIXME comment |
CWE-398 | C/C++ | cpp/todo-comment | TODO comment |
CWE-398 | C/C++ | cpp/inconsistent-null-check | Inconsistent nullness check |
CWE-398 | C/C++ | cpp/useless-expression | Expression has no effect |
CWE-398 | C/C++ | cpp/bad-strncpy-size | Possibly wrong buffer size in string copy |
CWE-398 | C/C++ | cpp/suspicious-call-to-memset | Suspicious call to memset |
CWE-398 | C/C++ | cpp/unsafe-strncat | Potentially unsafe call to strncat |
CWE-398 | C/C++ | cpp/unsafe-strcat | Potentially unsafe use of strcat |
CWE-398 | C/C++ | cpp/redundant-null-check-simple | Redundant null check due to previous dereference |
CWE-398 | C/C++ | cpp/incorrect-allocation-error-handling | Incorrect allocation-error handling |
CWE-398 | C/C++ | cpp/dangerous-function-overflow | Use of dangerous function |
CWE-398 | C/C++ | cpp/dangerous-cin | Dangerous use of 'cin' |
CWE-398 | C/C++ | cpp/potentially-dangerous-function | Use of potentially dangerous function |
CWE-398 | C/C++ | cpp/deref-null-result | Null dereference from a function result |
CWE-398 | C/C++ | cpp/redundant-null-check-param | Redundant null check or missing null check of parameter |
CWE-398 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-398 | C/C++ | cpp/operator-find-incorrectly-used-switch | Incorrect switch statement |
CWE-398 | C# | cs/call-to-obsolete-method | Call to obsolete method |
CWE-398 | C# | cs/todo-comment | TODO comment |
CWE-398 | C# | cs/dereferenced-value-is-always-null | Dereferenced variable is always null |
CWE-398 | C# | cs/dereferenced-value-may-be-null | Dereferenced variable may be null |
CWE-398 | C# | cs/unused-reftype | Dead reference types |
CWE-398 | C# | cs/useless-assignment-to-local | Useless assignment to local variable |
CWE-398 | C# | cs/unused-field | Unused field |
CWE-398 | C# | cs/unused-method | Unused method |
CWE-398 | C# | cs/useless-cast-to-self | Cast to same type |
CWE-398 | C# | cs/useless-is-before-as | Useless 'is' before 'as' |
CWE-398 | C# | cs/coalesce-of-identical-expressions | Useless ?? expression |
CWE-398 | C# | cs/useless-type-test | Useless type test |
CWE-398 | C# | cs/useless-upcast | Useless upcast |
CWE-398 | C# | cs/empty-collection | Container contents are never initialized |
CWE-398 | C# | cs/unused-collection | Container contents are never accessed |
CWE-398 | C# | cs/empty-lock-statement | Empty lock statement |
CWE-398 | C# | cs/linq/useless-select | Redundant Select |
CWE-398 | Go | go/comparison-of-identical-expressions | Comparison of identical values |
CWE-398 | Go | go/useless-assignment-to-field | Useless assignment to field |
CWE-398 | Go | go/useless-assignment-to-local | Useless assignment to local variable |
CWE-398 | Go | go/duplicate-branches | Duplicate 'if' branches |
CWE-398 | Go | go/duplicate-condition | Duplicate 'if' condition |
CWE-398 | Go | go/duplicate-switch-case | Duplicate switch case |
CWE-398 | Go | go/useless-expression | Expression has no effect |
CWE-398 | Go | go/redundant-operation | Identical operands |
CWE-398 | Go | go/redundant-assignment | Self assignment |
CWE-398 | Go | go/unreachable-statement | Unreachable statement |
CWE-398 | Go | go/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-398 | Java/Kotlin | java/deprecated-call | Deprecated method or constructor invocation |
CWE-398 | Java/Kotlin | java/dead-class | Dead class |
CWE-398 | Java/Kotlin | java/dead-enum-constant | Dead enum constant |
CWE-398 | Java/Kotlin | java/dead-field | Dead field |
CWE-398 | Java/Kotlin | java/dead-function | Dead method |
CWE-398 | Java/Kotlin | java/lines-of-dead-code | Lines of dead code in files |
CWE-398 | Java/Kotlin | java/unused-parameter | Useless parameter |
CWE-398 | Java/Kotlin | java/useless-null-check | Useless null check |
CWE-398 | Java/Kotlin | java/useless-type-test | Useless type test |
CWE-398 | Java/Kotlin | java/useless-upcast | Useless upcast |
CWE-398 | Java/Kotlin | java/empty-container | Container contents are never initialized |
CWE-398 | Java/Kotlin | java/unused-container | Container contents are never accessed |
CWE-398 | Java/Kotlin | java/constant-comparison | Useless comparison test |
CWE-398 | Java/Kotlin | java/dereferenced-value-is-always-null | Dereferenced variable is always null |
CWE-398 | Java/Kotlin | java/dereferenced-expr-may-be-null | Dereferenced expression may be null |
CWE-398 | Java/Kotlin | java/dereferenced-value-may-be-null | Dereferenced variable may be null |
CWE-398 | Java/Kotlin | java/empty-synchronized-block | Empty synchronized block |
CWE-398 | Java/Kotlin | java/unreachable-catch-clause | Unreachable catch clause |
CWE-398 | Java/Kotlin | java/potentially-dangerous-function | Use of a potentially dangerous function |
CWE-398 | Java/Kotlin | java/todo-comment | TODO/FIXME comments |
CWE-398 | Java/Kotlin | java/unused-reference-type | Unused classes and interfaces |
CWE-398 | Java/Kotlin | java/overwritten-assignment-to-local | Assigned value is overwritten |
CWE-398 | Java/Kotlin | java/useless-assignment-to-local | Useless assignment to local variable |
CWE-398 | Java/Kotlin | java/unused-initialized-local | Local variable is initialized but not used |
CWE-398 | Java/Kotlin | java/local-variable-is-never-read | Unread local variable |
CWE-398 | Java/Kotlin | java/unused-field | Unused field |
CWE-398 | Java/Kotlin | java/unused-label | Unused label |
CWE-398 | Java/Kotlin | java/unused-local-variable | Unused local variable |
CWE-398 | Java/Kotlin | java/switch-fall-through | Unterminated switch case |
CWE-398 | Java/Kotlin | java/redundant-cast | Unnecessary cast |
CWE-398 | Java/Kotlin | java/unused-import | Unnecessary import |
CWE-398 | JavaScript/TypeScript | js/todo-comment | TODO comment |
CWE-398 | JavaScript/TypeScript | js/eval-like-call | Call to eval-like DOM function |
CWE-398 | JavaScript/TypeScript | js/variable-initialization-conflict | Conflicting variable initialization |
CWE-398 | JavaScript/TypeScript | js/function-declaration-conflict | Conflicting function declarations |
CWE-398 | JavaScript/TypeScript | js/useless-assignment-to-global | Useless assignment to global variable |
CWE-398 | JavaScript/TypeScript | js/useless-assignment-to-local | Useless assignment to local variable |
CWE-398 | JavaScript/TypeScript | js/overwritten-property | Overwritten property |
CWE-398 | JavaScript/TypeScript | js/comparison-of-identical-expressions | Comparison of identical values |
CWE-398 | JavaScript/TypeScript | js/comparison-with-nan | Comparison with NaN |
CWE-398 | JavaScript/TypeScript | js/duplicate-condition | Duplicate 'if' condition |
CWE-398 | JavaScript/TypeScript | js/duplicate-property | Duplicate property |
CWE-398 | JavaScript/TypeScript | js/duplicate-switch-case | Duplicate switch case |
CWE-398 | JavaScript/TypeScript | js/useless-expression | Expression has no effect |
CWE-398 | JavaScript/TypeScript | js/comparison-between-incompatible-types | Comparison between inconvertible types |
CWE-398 | JavaScript/TypeScript | js/redundant-operation | Identical operands |
CWE-398 | JavaScript/TypeScript | js/redundant-assignment | Self assignment |
CWE-398 | JavaScript/TypeScript | js/call-to-non-callable | Invocation of non-function |
CWE-398 | JavaScript/TypeScript | js/property-access-on-non-object | Property access on null or undefined |
CWE-398 | JavaScript/TypeScript | js/unneeded-defensive-code | Unneeded defensive code |
CWE-398 | JavaScript/TypeScript | js/useless-type-test | Useless type test |
CWE-398 | JavaScript/TypeScript | js/eval-call | Use of eval |
CWE-398 | JavaScript/TypeScript | js/node/assignment-to-exports-variable | Assignment to exports variable |
CWE-398 | JavaScript/TypeScript | js/regex/unmatchable-caret | Unmatchable caret in regular expression |
CWE-398 | JavaScript/TypeScript | js/regex/unmatchable-dollar | Unmatchable dollar in regular expression |
CWE-398 | JavaScript/TypeScript | js/useless-assignment-in-return | Return statement assigns local variable |
CWE-398 | JavaScript/TypeScript | js/unreachable-statement | Unreachable statement |
CWE-398 | JavaScript/TypeScript | js/trivial-conditional | Useless conditional |
CWE-398 | Python | py/unreachable-except | Unreachable 'except' block |
CWE-398 | Python | py/comparison-of-constants | Comparison of constants |
CWE-398 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-398 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-398 | Python | py/redundant-comparison | Redundant comparison |
CWE-398 | Python | py/duplicate-key-dict-literal | Duplicate key in dict literal |
CWE-398 | Python | py/import-deprecated-module | Import of deprecated module |
CWE-398 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-398 | Python | py/redundant-assignment | Redundant assignment |
CWE-398 | Python | py/ineffectual-statement | Statement has no effect |
CWE-398 | Python | py/unreachable-statement | Unreachable code |
CWE-398 | Python | py/multiple-definition | Variable defined multiple times |
CWE-398 | Python | py/unused-local-variable | Unused local variable |
CWE-398 | Python | py/unused-global-variable | Unused global variable |
CWE-398 | Ruby | rb/useless-assignment-to-local | Useless assignment to local variable |
CWE-398 | Ruby | rb/unused-parameter | Unused parameter. |
CWE-400 | C/C++ | cpp/catch-missing-free | Leaky catch |
CWE-400 | C/C++ | cpp/descriptor-may-not-be-closed | Open descriptor may not be closed |
CWE-400 | C/C++ | cpp/descriptor-never-closed | Open descriptor never closed |
CWE-400 | C/C++ | cpp/file-may-not-be-closed | Open file may not be closed |
CWE-400 | C/C++ | cpp/file-never-closed | Open file is not closed |
CWE-400 | C/C++ | cpp/memory-may-not-be-freed | Memory may not be freed |
CWE-400 | C/C++ | cpp/memory-never-freed | Memory is never freed |
CWE-400 | C/C++ | cpp/new-free-mismatch | Mismatching new/free or malloc/delete |
CWE-400 | C/C++ | cpp/alloca-in-loop | Call to alloca in a loop |
CWE-400 | C/C++ | cpp/uncontrolled-allocation-size | Uncontrolled allocation size |
CWE-400 | C/C++ | cpp/memory-leak-on-failed-call-to-realloc | Memory leak on failed call to realloc |
CWE-400 | C# | cs/redos | Denial of Service from comparison of user input against expensive regex |
CWE-400 | C# | cs/regex-injection | Regular expression injection |
CWE-400 | Go | go/uncontrolled-allocation-size | Slice memory allocation with excessive size value |
CWE-400 | Java/Kotlin | java/input-resource-leak | Potential input resource leak |
CWE-400 | Java/Kotlin | java/database-resource-leak | Potential database resource leak |
CWE-400 | Java/Kotlin | java/output-resource-leak | Potential output resource leak |
CWE-400 | Java/Kotlin | java/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-400 | Java/Kotlin | java/redos | Inefficient regular expression |
CWE-400 | Java/Kotlin | java/regex-injection | Regular expression injection |
CWE-400 | Java/Kotlin | java/log4j-injection | Potential Log4J LDAP JNDI injection (CVE-2021-44228) |
CWE-400 | Java/Kotlin | java/local-thread-resource-abuse | Uncontrolled thread resource consumption from local input source |
CWE-400 | Java/Kotlin | java/thread-resource-abuse | Uncontrolled thread resource consumption |
CWE-400 | JavaScript/TypeScript | js/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-400 | JavaScript/TypeScript | js/redos | Inefficient regular expression |
CWE-400 | JavaScript/TypeScript | js/resource-exhaustion-from-deep-object-traversal | Resources exhaustion from deep object traversal |
CWE-400 | JavaScript/TypeScript | js/remote-property-injection | Remote property injection |
CWE-400 | JavaScript/TypeScript | js/regex-injection | Regular expression injection |
CWE-400 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-400 | JavaScript/TypeScript | js/resource-exhaustion | Resource exhaustion |
CWE-400 | JavaScript/TypeScript | js/xml-bomb | XML internal entity expansion |
CWE-400 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-400 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-400 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-400 | JavaScript/TypeScript | js/remote-property-injection-more-sources | Remote property injection with additional heuristic sources |
CWE-400 | JavaScript/TypeScript | js/regex-injection-more-sources | Regular expression injection with additional heuristic sources |
CWE-400 | JavaScript/TypeScript | js/resource-exhaustion-more-sources | Resource exhaustion with additional heuristic sources |
CWE-400 | JavaScript/TypeScript | js/xml-bomb-more-sources | XML internal entity expansion with additional heuristic sources |
CWE-400 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-400 | Python | py/file-not-closed | File is not always closed |
CWE-400 | Python | py/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-400 | Python | py/redos | Inefficient regular expression |
CWE-400 | Python | py/regex-injection | Regular expression injection |
CWE-400 | Python | py/xml-bomb | XML internal entity expansion |
CWE-400 | Python | py/unicode-dos | Denial of Service using Unicode Characters |
CWE-400 | Ruby | rb/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-400 | Ruby | rb/redos | Inefficient regular expression |
CWE-400 | Ruby | rb/regexp-injection | Regular expression injection |
CWE-400 | Swift | swift/redos | Inefficient regular expression |
CWE-400 | Swift | swift/regex-injection | Regular expression injection |
CWE-401 | C/C++ | cpp/catch-missing-free | Leaky catch |
CWE-401 | C/C++ | cpp/memory-may-not-be-freed | Memory may not be freed |
CWE-401 | C/C++ | cpp/memory-never-freed | Memory is never freed |
CWE-401 | C/C++ | cpp/new-free-mismatch | Mismatching new/free or malloc/delete |
CWE-401 | C/C++ | cpp/memory-leak-on-failed-call-to-realloc | Memory leak on failed call to realloc |
CWE-404 | C/C++ | cpp/catch-missing-free | Leaky catch |
CWE-404 | C/C++ | cpp/descriptor-may-not-be-closed | Open descriptor may not be closed |
CWE-404 | C/C++ | cpp/descriptor-never-closed | Open descriptor never closed |
CWE-404 | C/C++ | cpp/file-may-not-be-closed | Open file may not be closed |
CWE-404 | C/C++ | cpp/file-never-closed | Open file is not closed |
CWE-404 | C/C++ | cpp/memory-may-not-be-freed | Memory may not be freed |
CWE-404 | C/C++ | cpp/memory-never-freed | Memory is never freed |
CWE-404 | C/C++ | cpp/new-free-mismatch | Mismatching new/free or malloc/delete |
CWE-404 | C/C++ | cpp/memory-leak-on-failed-call-to-realloc | Memory leak on failed call to realloc |
CWE-404 | C/C++ | cpp/resource-not-released-in-destructor | Resource not released in destructor |
CWE-404 | C# | cs/dispose-not-called-on-throw | Dispose may not be called if an exception is thrown during execution |
CWE-404 | C# | cs/member-not-disposed | Missing Dispose call |
CWE-404 | C# | cs/missing-dispose-method | Missing Dispose method |
CWE-404 | C# | cs/local-not-disposed | Missing Dispose call on local IDisposable |
CWE-404 | Java/Kotlin | java/missing-super-finalize | Finalizer inconsistency |
CWE-404 | Java/Kotlin | java/input-resource-leak | Potential input resource leak |
CWE-404 | Java/Kotlin | java/database-resource-leak | Potential database resource leak |
CWE-404 | Java/Kotlin | java/output-resource-leak | Potential output resource leak |
CWE-404 | Java/Kotlin | java/empty-finalizer | Empty body of finalizer |
CWE-404 | Java/Kotlin | java/disabled-certificate-revocation-checking | Disabled certificate revocation checking |
CWE-404 | Python | py/file-not-closed | File is not always closed |
CWE-405 | C/C++ | cpp/data-decompression-bomb | User-controlled file decompression |
CWE-405 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-405 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-405 | Go | go/uncontrolled-file-decompression | Uncontrolled file decompression |
CWE-405 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-405 | Java/Kotlin | java/uncontrolled-file-decompression | Uncontrolled file decompression |
CWE-405 | JavaScript/TypeScript | js/xml-bomb | XML internal entity expansion |
CWE-405 | JavaScript/TypeScript | js/xml-bomb-more-sources | XML internal entity expansion with additional heuristic sources |
CWE-405 | Python | py/xml-bomb | XML internal entity expansion |
CWE-405 | Python | py/decompression-bomb | Decompression Bomb |
CWE-405 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-405 | Ruby | rb/user-controlled-data-decompression | User-controlled file decompression |
CWE-405 | Ruby | rb/user-controlled-file-decompression | User-controlled file decompression |
CWE-405 | Ruby | rb/xxe | XML external entity expansion |
CWE-405 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-409 | C/C++ | cpp/data-decompression-bomb | User-controlled file decompression |
CWE-409 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-409 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-409 | Go | go/uncontrolled-file-decompression | Uncontrolled file decompression |
CWE-409 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-409 | Java/Kotlin | java/uncontrolled-file-decompression | Uncontrolled file decompression |
CWE-409 | JavaScript/TypeScript | js/xml-bomb | XML internal entity expansion |
CWE-409 | JavaScript/TypeScript | js/xml-bomb-more-sources | XML internal entity expansion with additional heuristic sources |
CWE-409 | Python | py/xml-bomb | XML internal entity expansion |
CWE-409 | Python | py/decompression-bomb | Decompression Bomb |
CWE-409 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-409 | Ruby | rb/user-controlled-data-decompression | User-controlled file decompression |
CWE-409 | Ruby | rb/user-controlled-file-decompression | User-controlled file decompression |
CWE-409 | Ruby | rb/xxe | XML external entity expansion |
CWE-409 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-413 | Java/Kotlin | java/unsynchronized-getter | Inconsistent synchronization of getter and setter |
CWE-415 | C/C++ | cpp/double-free | Potential double free |
CWE-415 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-415 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-416 | C/C++ | cpp/use-after-free | Potential use after free |
CWE-416 | C/C++ | cpp/iterator-to-expired-container | Iterator to expired container |
CWE-416 | C/C++ | cpp/use-of-string-after-lifetime-ends | Use of string after lifetime ends |
CWE-416 | C/C++ | cpp/use-of-unique-pointer-after-lifetime-ends | Use of unique pointer after lifetime ends |
CWE-416 | C/C++ | cpp/use-after-expired-lifetime | Use of object after its lifetime has ended |
CWE-420 | Java/Kotlin | java/socket-auth-race-condition | Race condition in socket authentication |
CWE-421 | Java/Kotlin | java/socket-auth-race-condition | Race condition in socket authentication |
CWE-428 | C/C++ | cpp/unsafe-create-process-call | NULL application name with an unquoted path in call to CreateProcess |
CWE-434 | C# | cs/web/file-upload | Use of file upload |
CWE-434 | JavaScript/TypeScript | js/http-to-file-access | Network data written to file |
CWE-434 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-435 | C/C++ | cpp/memset-may-be-deleted | Call to memset may be deleted |
CWE-435 | JavaScript/TypeScript | js/insecure-http-parser | Insecure http parser |
CWE-436 | JavaScript/TypeScript | js/insecure-http-parser | Insecure http parser |
CWE-441 | C# | cs/request-forgery | Server-side request forgery |
CWE-441 | Go | go/request-forgery | Uncontrolled data used in network request |
CWE-441 | Go | go/ssrf | Uncontrolled data used in network request |
CWE-441 | Java/Kotlin | java/android/unsafe-content-uri-resolution | Uncontrolled data used in content resolution |
CWE-441 | Java/Kotlin | java/ssrf | Server-side request forgery |
CWE-441 | JavaScript/TypeScript | js/client-side-request-forgery | Client-side request forgery |
CWE-441 | JavaScript/TypeScript | js/request-forgery | Server-side request forgery |
CWE-441 | JavaScript/TypeScript | javascript/ssrf | Uncontrolled data used in network request |
CWE-441 | Python | py/full-ssrf | Full server-side request forgery |
CWE-441 | Python | py/partial-ssrf | Partial server-side request forgery |
CWE-441 | Ruby | rb/request-forgery | Server-side request forgery |
CWE-444 | JavaScript/TypeScript | js/insecure-http-parser | Insecure http parser |
CWE-451 | C# | cs/web/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-451 | JavaScript/TypeScript | js/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-454 | Java/Kotlin | java/exec-tainted-environment | Building a command with an injected environment variable |
CWE-456 | C/C++ | cpp/initialization-not-run | Initialization code not run |
CWE-457 | C/C++ | cpp/global-use-before-init | Global variable may be used before initialization |
CWE-457 | C/C++ | cpp/not-initialised | Variable not initialized before use |
CWE-457 | C/C++ | cpp/uninitialized-local | Potentially uninitialized local variable |
CWE-457 | C/C++ | cpp/conditionally-uninitialized-variable | Conditionally uninitialized variable |
CWE-457 | C# | cs/unassigned-field | Field is never assigned a non-default value |
CWE-457 | Java/Kotlin | java/unassigned-field | Field is never assigned a non-null value |
CWE-459 | C# | cs/dispose-not-called-on-throw | Dispose may not be called if an exception is thrown during execution |
CWE-459 | C# | cs/member-not-disposed | Missing Dispose call |
CWE-459 | C# | cs/missing-dispose-method | Missing Dispose method |
CWE-459 | C# | cs/local-not-disposed | Missing Dispose call on local IDisposable |
CWE-459 | Java/Kotlin | java/missing-super-finalize | Finalizer inconsistency |
CWE-459 | Java/Kotlin | java/empty-finalizer | Empty body of finalizer |
CWE-460 | C# | cs/dispose-not-called-on-throw | Dispose may not be called if an exception is thrown during execution |
CWE-460 | C# | cs/local-not-disposed | Missing Dispose call on local IDisposable |
CWE-467 | C/C++ | cpp/suspicious-sizeof | Suspicious 'sizeof' use |
CWE-468 | C/C++ | cpp/suspicious-pointer-scaling | Suspicious pointer scaling |
CWE-468 | C/C++ | cpp/incorrect-pointer-scaling-char | Suspicious pointer scaling to char |
CWE-468 | C/C++ | cpp/suspicious-pointer-scaling-void | Suspicious pointer scaling to void |
CWE-468 | C/C++ | cpp/suspicious-add-sizeof | Suspicious add with sizeof |
CWE-470 | Java/Kotlin | java/android/fragment-injection | Android fragment injection |
CWE-470 | Java/Kotlin | java/android/fragment-injection-preference-activity | Android fragment injection in PreferenceActivity |
CWE-470 | Java/Kotlin | java/android/unsafe-reflection | Load 3rd party classes or code ('unsafe reflection') without signature check |
CWE-470 | Java/Kotlin | java/unsafe-reflection | Use of externally-controlled input to select classes or code ('unsafe reflection') |
CWE-471 | C# | cs/web/html-hidden-input | Use of HTMLInputHidden |
CWE-471 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-471 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-471 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-471 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-472 | C# | cs/web/html-hidden-input | Use of HTMLInputHidden |
CWE-476 | C/C++ | cpp/inconsistent-nullness-testing | Inconsistent null check of pointer |
CWE-476 | C/C++ | cpp/missing-null-test | Returned pointer not checked |
CWE-476 | C/C++ | cpp/inconsistent-null-check | Inconsistent nullness check |
CWE-476 | C/C++ | cpp/redundant-null-check-simple | Redundant null check due to previous dereference |
CWE-476 | C/C++ | cpp/deref-null-result | Null dereference from a function result |
CWE-476 | C/C++ | cpp/redundant-null-check-param | Redundant null check or missing null check of parameter |
CWE-476 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-476 | C# | cs/dereferenced-value-is-always-null | Dereferenced variable is always null |
CWE-476 | C# | cs/dereferenced-value-may-be-null | Dereferenced variable may be null |
CWE-476 | Java/Kotlin | java/dereferenced-value-is-always-null | Dereferenced variable is always null |
CWE-476 | Java/Kotlin | java/dereferenced-expr-may-be-null | Dereferenced expression may be null |
CWE-476 | Java/Kotlin | java/dereferenced-value-may-be-null | Dereferenced variable may be null |
CWE-476 | JavaScript/TypeScript | js/call-to-non-callable | Invocation of non-function |
CWE-476 | JavaScript/TypeScript | js/property-access-on-non-object | Property access on null or undefined |
CWE-477 | C# | cs/call-to-obsolete-method | Call to obsolete method |
CWE-477 | Java/Kotlin | java/deprecated-call | Deprecated method or constructor invocation |
CWE-477 | Python | py/import-deprecated-module | Import of deprecated module |
CWE-478 | C/C++ | cpp/missing-case-in-switch | Missing enum case in switch |
CWE-478 | C/C++ | cpp/operator-find-incorrectly-used-switch | Incorrect switch statement |
CWE-478 | Java/Kotlin | java/missing-default-in-switch | Missing default case in switch |
CWE-478 | Java/Kotlin | java/missing-case-in-switch | Missing enum case in switch |
CWE-480 | C/C++ | cpp/assign-where-compare-meant | Assignment where comparison was intended |
CWE-480 | C/C++ | cpp/compare-where-assign-meant | Comparison where assignment was intended |
CWE-480 | C/C++ | cpp/incorrect-not-operator-usage | Incorrect 'not' operator usage |
CWE-480 | C/C++ | cpp/logical-operator-applied-to-flag | Short-circuiting operator applied to flag |
CWE-480 | C/C++ | cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations | Operator Precedence Logic Error When Use Bitwise Or Logical Operations |
CWE-480 | C/C++ | cpp/operator-precedence-logic-error-when-use-bool-type | Operator Precedence Logic Error When Use Bool Type |
CWE-480 | C# | cs/non-short-circuit | Potentially dangerous use of non-short-circuit logic |
CWE-480 | Go | go/useless-expression | Expression has no effect |
CWE-480 | Go | go/redundant-operation | Identical operands |
CWE-480 | Go | go/redundant-assignment | Self assignment |
CWE-480 | Java/Kotlin | java/assignment-in-boolean-expression | Assignment in Boolean expression |
CWE-480 | Java/Kotlin | java/reference-equality-on-strings | Reference equality test on strings |
CWE-480 | JavaScript/TypeScript | js/useless-expression | Expression has no effect |
CWE-480 | JavaScript/TypeScript | js/redundant-operation | Identical operands |
CWE-480 | JavaScript/TypeScript | js/redundant-assignment | Self assignment |
CWE-480 | JavaScript/TypeScript | js/deletion-of-non-property | Deleting non-property |
CWE-481 | C/C++ | cpp/assign-where-compare-meant | Assignment where comparison was intended |
CWE-481 | Java/Kotlin | java/assignment-in-boolean-expression | Assignment in Boolean expression |
CWE-482 | C/C++ | cpp/compare-where-assign-meant | Comparison where assignment was intended |
CWE-483 | JavaScript/TypeScript | js/misleading-indentation-of-dangling-else | Misleading indentation of dangling 'else' |
CWE-483 | JavaScript/TypeScript | js/misleading-indentation-after-control-statement | Misleading indentation after control statement |
CWE-484 | Java/Kotlin | java/switch-fall-through | Unterminated switch case |
CWE-485 | C# | cs/class-name-comparison | Erroneous class compare |
CWE-485 | C# | cs/cast-from-abstract-to-concrete-collection | Cast from abstract to concrete collection |
CWE-485 | C# | cs/expose-implementation | Exposing internal representation |
CWE-485 | C# | cs/web/debug-code | ASP.NET: leftover debug code |
CWE-485 | Java/Kotlin | java/missing-call-to-super-clone | Missing super clone |
CWE-485 | Java/Kotlin | java/cleartext-storage-in-class | Cleartext storage of sensitive information using storable class |
CWE-485 | Java/Kotlin | java/android/debuggable-attribute-enabled | Android debuggable attribute enabled |
CWE-485 | Java/Kotlin | java/android/webview-debugging-enabled | Android Webview debugging enabled |
CWE-485 | Java/Kotlin | java/trust-boundary-violation | Trust boundary violation |
CWE-485 | Java/Kotlin | java/android/unsafe-android-webview-fetch | Unsafe resource fetching in Android WebView |
CWE-485 | Java/Kotlin | java/abstract-to-concrete-cast | Cast from abstract to concrete collection |
CWE-485 | Java/Kotlin | java/internal-representation-exposure | Exposing internal representation |
CWE-485 | Java/Kotlin | java/main-method-in-enterprise-bean | Main Method in Enterprise Java Bean |
CWE-485 | Java/Kotlin | java/main-method-in-web-components | Main Method in Java EE Web Components |
CWE-485 | Java/Kotlin | java/struts-development-mode | Apache Struts development mode enabled |
CWE-485 | JavaScript/TypeScript | js/alert-call | Invocation of alert |
CWE-485 | JavaScript/TypeScript | js/debugger-statement | Use of debugger statement |
CWE-485 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-485 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-485 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-485 | Swift | swift/unsafe-js-eval | JavaScript Injection |
CWE-486 | C# | cs/class-name-comparison | Erroneous class compare |
CWE-489 | C# | cs/web/debug-code | ASP.NET: leftover debug code |
CWE-489 | Java/Kotlin | java/android/debuggable-attribute-enabled | Android debuggable attribute enabled |
CWE-489 | Java/Kotlin | java/android/webview-debugging-enabled | Android Webview debugging enabled |
CWE-489 | Java/Kotlin | java/main-method-in-enterprise-bean | Main Method in Enterprise Java Bean |
CWE-489 | Java/Kotlin | java/main-method-in-web-components | Main Method in Java EE Web Components |
CWE-489 | Java/Kotlin | java/struts-development-mode | Apache Struts development mode enabled |
CWE-489 | JavaScript/TypeScript | js/alert-call | Invocation of alert |
CWE-489 | JavaScript/TypeScript | js/debugger-statement | Use of debugger statement |
CWE-489 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-494 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-494 | JavaScript/TypeScript | js/enabling-electron-insecure-content | Enabling Electron allowRunningInsecureContent |
CWE-494 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-494 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-497 | C/C++ | cpp/system-data-exposure | Exposure of system data to an unauthorized control sphere |
CWE-497 | C/C++ | cpp/potential-system-data-exposure | Potential exposure of sensitive system data to an unauthorized control sphere |
CWE-497 | C# | cs/information-exposure-through-exception | Information exposure through an exception |
CWE-497 | Go | go/stack-trace-exposure | Information exposure through a stack trace |
CWE-497 | Java/Kotlin | java/stack-trace-exposure | Information exposure through a stack trace |
CWE-497 | JavaScript/TypeScript | js/stack-trace-exposure | Information exposure through a stack trace |
CWE-497 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-497 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-499 | Java/Kotlin | java/cleartext-storage-in-class | Cleartext storage of sensitive information using storable class |
CWE-501 | Java/Kotlin | java/trust-boundary-violation | Trust boundary violation |
CWE-502 | C# | cs/deserialized-delegate | Deserialized delegate |
CWE-502 | C# | cs/unsafe-deserialization | Unsafe deserializer |
CWE-502 | C# | cs/unsafe-deserialization-untrusted-input | Deserialization of untrusted data |
CWE-502 | Java/Kotlin | java/unsafe-deserialization | Deserialization of user-controlled data |
CWE-502 | Java/Kotlin | java/log4j-injection | Potential Log4J LDAP JNDI injection (CVE-2021-44228) |
CWE-502 | Java/Kotlin | java/unsafe-deserialization-rmi | Unsafe deserialization in a remotely callable method. |
CWE-502 | Java/Kotlin | java/unsafe-deserialization-spring-exporter-in-configuration-class | Unsafe deserialization with Spring's remote service exporters. |
CWE-502 | Java/Kotlin | java/unsafe-deserialization-spring-exporter-in-xml-configuration | Unsafe deserialization with Spring's remote service exporters. |
CWE-502 | JavaScript/TypeScript | js/unsafe-deserialization | Deserialization of user-controlled data |
CWE-502 | JavaScript/TypeScript | js/unsafe-deserialization-more-sources | Deserialization of user-controlled data with additional heuristic sources |
CWE-502 | Python | py/unsafe-deserialization | Deserialization of user-controlled data |
CWE-502 | Ruby | rb/unsafe-unsafeyamldeserialization | Deserialization of user-controlled yaml data |
CWE-502 | Ruby | rb/unsafe-deserialization | Deserialization of user-controlled data |
CWE-506 | JavaScript/TypeScript | js/hardcoded-data-interpreted-as-code | Hard-coded data interpreted as code |
CWE-506 | Ruby | rb/hardcoded-data-interpreted-as-code | Hard-coded data interpreted as code |
CWE-521 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-521 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-522 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-522 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-522 | C# | cs/password-in-configuration | Password in configuration file |
CWE-522 | Java/Kotlin | java/insecure-basic-auth | Insecure basic authentication |
CWE-522 | Java/Kotlin | java/insecure-ldap-auth | Insecure LDAP authentication |
CWE-522 | Java/Kotlin | java/credentials-in-properties | Cleartext Credentials in Properties File |
CWE-522 | Java/Kotlin | java/password-in-configuration | Password in configuration file |
CWE-522 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-522 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-522 | JavaScript/TypeScript | js/user-controlled-data-decompression | User-controlled file decompression |
CWE-522 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-523 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-524 | Java/Kotlin | java/android/sensitive-keyboard-cache | Android sensitive keyboard cache |
CWE-532 | C# | cs/web/debug-binary | Creating an ASP.NET debug binary may reveal sensitive information |
CWE-532 | Java/Kotlin | java/sensitive-log | Insertion of sensitive information into log files |
CWE-532 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-532 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-532 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-532 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-532 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-538 | C# | cs/web/debug-binary | Creating an ASP.NET debug binary may reveal sensitive information |
CWE-538 | C# | cs/web/directory-browse-enabled | ASP.NET config file enables directory browsing |
CWE-538 | C# | cs/web/persistent-cookie | Cookie security: persistent cookie |
CWE-538 | Java/Kotlin | java/sensitive-log | Insertion of sensitive information into log files |
CWE-538 | Java/Kotlin | java/server-directory-listing | Directories and files exposure |
CWE-538 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-538 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-538 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-538 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-538 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-538 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-539 | C# | cs/web/persistent-cookie | Cookie security: persistent cookie |
CWE-543 | Java/Kotlin | java/lazy-initialization | Incorrect lazy initialization of a static field |
CWE-546 | C/C++ | cpp/fixme-comment | FIXME comment |
CWE-546 | C/C++ | cpp/todo-comment | TODO comment |
CWE-546 | C# | cs/todo-comment | TODO comment |
CWE-546 | Java/Kotlin | java/todo-comment | TODO/FIXME comments |
CWE-546 | JavaScript/TypeScript | js/todo-comment | TODO comment |
CWE-548 | C# | cs/web/directory-browse-enabled | ASP.NET config file enables directory browsing |
CWE-548 | Java/Kotlin | java/server-directory-listing | Directories and files exposure |
CWE-548 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-552 | C# | cs/web/debug-binary | Creating an ASP.NET debug binary may reveal sensitive information |
CWE-552 | C# | cs/web/directory-browse-enabled | ASP.NET config file enables directory browsing |
CWE-552 | Java/Kotlin | java/sensitive-log | Insertion of sensitive information into log files |
CWE-552 | Java/Kotlin | java/unvalidated-url-forward | URL forward from a remote source |
CWE-552 | Java/Kotlin | java/server-directory-listing | Directories and files exposure |
CWE-552 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-552 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-552 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-552 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-552 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-552 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-555 | Java/Kotlin | java/credentials-in-properties | Cleartext Credentials in Properties File |
CWE-555 | Java/Kotlin | java/password-in-configuration | Password in configuration file |
CWE-560 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-561 | C/C++ | cpp/unused-static-function | Unused static function |
CWE-561 | C/C++ | cpp/dead-code-condition | Branching condition always evaluates to same value |
CWE-561 | C/C++ | cpp/dead-code-function | Function is never called |
CWE-561 | C/C++ | cpp/dead-code-goto | Dead code due to goto or break statement |
CWE-561 | C/C++ | cpp/useless-expression | Expression has no effect |
CWE-561 | C/C++ | cpp/incorrect-allocation-error-handling | Incorrect allocation-error handling |
CWE-561 | C/C++ | cpp/operator-find-incorrectly-used-switch | Incorrect switch statement |
CWE-561 | C# | cs/unused-reftype | Dead reference types |
CWE-561 | C# | cs/unused-field | Unused field |
CWE-561 | C# | cs/unused-method | Unused method |
CWE-561 | C# | cs/useless-cast-to-self | Cast to same type |
CWE-561 | C# | cs/useless-is-before-as | Useless 'is' before 'as' |
CWE-561 | C# | cs/coalesce-of-identical-expressions | Useless ?? expression |
CWE-561 | C# | cs/useless-type-test | Useless type test |
CWE-561 | C# | cs/useless-upcast | Useless upcast |
CWE-561 | C# | cs/empty-collection | Container contents are never initialized |
CWE-561 | C# | cs/unused-collection | Container contents are never accessed |
CWE-561 | C# | cs/linq/useless-select | Redundant Select |
CWE-561 | Go | go/comparison-of-identical-expressions | Comparison of identical values |
CWE-561 | Go | go/duplicate-branches | Duplicate 'if' branches |
CWE-561 | Go | go/duplicate-condition | Duplicate 'if' condition |
CWE-561 | Go | go/duplicate-switch-case | Duplicate switch case |
CWE-561 | Go | go/useless-expression | Expression has no effect |
CWE-561 | Go | go/redundant-operation | Identical operands |
CWE-561 | Go | go/redundant-assignment | Self assignment |
CWE-561 | Go | go/unreachable-statement | Unreachable statement |
CWE-561 | Go | go/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-561 | Java/Kotlin | java/dead-class | Dead class |
CWE-561 | Java/Kotlin | java/dead-enum-constant | Dead enum constant |
CWE-561 | Java/Kotlin | java/dead-field | Dead field |
CWE-561 | Java/Kotlin | java/dead-function | Dead method |
CWE-561 | Java/Kotlin | java/lines-of-dead-code | Lines of dead code in files |
CWE-561 | Java/Kotlin | java/unused-parameter | Useless parameter |
CWE-561 | Java/Kotlin | java/useless-null-check | Useless null check |
CWE-561 | Java/Kotlin | java/useless-type-test | Useless type test |
CWE-561 | Java/Kotlin | java/useless-upcast | Useless upcast |
CWE-561 | Java/Kotlin | java/empty-container | Container contents are never initialized |
CWE-561 | Java/Kotlin | java/unused-container | Container contents are never accessed |
CWE-561 | Java/Kotlin | java/constant-comparison | Useless comparison test |
CWE-561 | Java/Kotlin | java/unreachable-catch-clause | Unreachable catch clause |
CWE-561 | Java/Kotlin | java/unused-reference-type | Unused classes and interfaces |
CWE-561 | Java/Kotlin | java/useless-assignment-to-local | Useless assignment to local variable |
CWE-561 | Java/Kotlin | java/local-variable-is-never-read | Unread local variable |
CWE-561 | Java/Kotlin | java/unused-field | Unused field |
CWE-561 | Java/Kotlin | java/unused-label | Unused label |
CWE-561 | Java/Kotlin | java/redundant-cast | Unnecessary cast |
CWE-561 | Java/Kotlin | java/unused-import | Unnecessary import |
CWE-561 | JavaScript/TypeScript | js/comparison-of-identical-expressions | Comparison of identical values |
CWE-561 | JavaScript/TypeScript | js/comparison-with-nan | Comparison with NaN |
CWE-561 | JavaScript/TypeScript | js/duplicate-condition | Duplicate 'if' condition |
CWE-561 | JavaScript/TypeScript | js/duplicate-switch-case | Duplicate switch case |
CWE-561 | JavaScript/TypeScript | js/useless-expression | Expression has no effect |
CWE-561 | JavaScript/TypeScript | js/comparison-between-incompatible-types | Comparison between inconvertible types |
CWE-561 | JavaScript/TypeScript | js/redundant-operation | Identical operands |
CWE-561 | JavaScript/TypeScript | js/redundant-assignment | Self assignment |
CWE-561 | JavaScript/TypeScript | js/unneeded-defensive-code | Unneeded defensive code |
CWE-561 | JavaScript/TypeScript | js/useless-type-test | Useless type test |
CWE-561 | JavaScript/TypeScript | js/regex/unmatchable-caret | Unmatchable caret in regular expression |
CWE-561 | JavaScript/TypeScript | js/regex/unmatchable-dollar | Unmatchable dollar in regular expression |
CWE-561 | JavaScript/TypeScript | js/unreachable-statement | Unreachable statement |
CWE-561 | JavaScript/TypeScript | js/trivial-conditional | Useless conditional |
CWE-561 | Python | py/unreachable-except | Unreachable 'except' block |
CWE-561 | Python | py/comparison-of-constants | Comparison of constants |
CWE-561 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-561 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-561 | Python | py/redundant-comparison | Redundant comparison |
CWE-561 | Python | py/duplicate-key-dict-literal | Duplicate key in dict literal |
CWE-561 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-561 | Python | py/ineffectual-statement | Statement has no effect |
CWE-561 | Python | py/unreachable-statement | Unreachable code |
CWE-563 | C/C++ | cpp/unused-local-variable | Unused local variable |
CWE-563 | C/C++ | cpp/unused-static-variable | Unused static variable |
CWE-563 | C/C++ | cpp/unused-variable | Variable is assigned a value that is never read |
CWE-563 | C# | cs/useless-assignment-to-local | Useless assignment to local variable |
CWE-563 | Go | go/useless-assignment-to-field | Useless assignment to field |
CWE-563 | Go | go/useless-assignment-to-local | Useless assignment to local variable |
CWE-563 | Java/Kotlin | java/overwritten-assignment-to-local | Assigned value is overwritten |
CWE-563 | Java/Kotlin | java/unused-initialized-local | Local variable is initialized but not used |
CWE-563 | Java/Kotlin | java/unused-local-variable | Unused local variable |
CWE-563 | JavaScript/TypeScript | js/variable-initialization-conflict | Conflicting variable initialization |
CWE-563 | JavaScript/TypeScript | js/function-declaration-conflict | Conflicting function declarations |
CWE-563 | JavaScript/TypeScript | js/useless-assignment-to-global | Useless assignment to global variable |
CWE-563 | JavaScript/TypeScript | js/useless-assignment-to-local | Useless assignment to local variable |
CWE-563 | JavaScript/TypeScript | js/overwritten-property | Overwritten property |
CWE-563 | JavaScript/TypeScript | js/duplicate-property | Duplicate property |
CWE-563 | JavaScript/TypeScript | js/node/assignment-to-exports-variable | Assignment to exports variable |
CWE-563 | JavaScript/TypeScript | js/useless-assignment-in-return | Return statement assigns local variable |
CWE-563 | Python | py/redundant-assignment | Redundant assignment |
CWE-563 | Python | py/multiple-definition | Variable defined multiple times |
CWE-563 | Python | py/unused-local-variable | Unused local variable |
CWE-563 | Python | py/unused-global-variable | Unused global variable |
CWE-563 | Ruby | rb/useless-assignment-to-local | Useless assignment to local variable |
CWE-563 | Ruby | rb/unused-parameter | Unused parameter. |
CWE-564 | Java/Kotlin | java/concatenated-sql-query | Query built by concatenation with a possibly-untrusted string |
CWE-564 | Java/Kotlin | java/sql-injection | Query built from user-controlled sources |
CWE-567 | C# | cs/unsynchronized-static-access | Unsynchronized access to static collection member in non-static context |
CWE-568 | Java/Kotlin | java/missing-super-finalize | Finalizer inconsistency |
CWE-568 | Java/Kotlin | java/empty-finalizer | Empty body of finalizer |
CWE-570 | C/C++ | cpp/incorrect-allocation-error-handling | Incorrect allocation-error handling |
CWE-570 | Go | go/comparison-of-identical-expressions | Comparison of identical values |
CWE-570 | Java/Kotlin | java/constant-comparison | Useless comparison test |
CWE-570 | JavaScript/TypeScript | js/comparison-of-identical-expressions | Comparison of identical values |
CWE-570 | JavaScript/TypeScript | js/comparison-with-nan | Comparison with NaN |
CWE-570 | JavaScript/TypeScript | js/comparison-between-incompatible-types | Comparison between inconvertible types |
CWE-570 | JavaScript/TypeScript | js/unneeded-defensive-code | Unneeded defensive code |
CWE-570 | JavaScript/TypeScript | js/useless-type-test | Useless type test |
CWE-570 | JavaScript/TypeScript | js/trivial-conditional | Useless conditional |
CWE-570 | Python | py/comparison-of-constants | Comparison of constants |
CWE-570 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-570 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-570 | Python | py/redundant-comparison | Redundant comparison |
CWE-570 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-571 | Go | go/comparison-of-identical-expressions | Comparison of identical values |
CWE-571 | Java/Kotlin | java/constant-comparison | Useless comparison test |
CWE-571 | JavaScript/TypeScript | js/comparison-of-identical-expressions | Comparison of identical values |
CWE-571 | JavaScript/TypeScript | js/comparison-with-nan | Comparison with NaN |
CWE-571 | JavaScript/TypeScript | js/comparison-between-incompatible-types | Comparison between inconvertible types |
CWE-571 | JavaScript/TypeScript | js/unneeded-defensive-code | Unneeded defensive code |
CWE-571 | JavaScript/TypeScript | js/useless-type-test | Useless type test |
CWE-571 | JavaScript/TypeScript | js/trivial-conditional | Useless conditional |
CWE-571 | Python | py/comparison-of-constants | Comparison of constants |
CWE-571 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-571 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-571 | Python | py/redundant-comparison | Redundant comparison |
CWE-571 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-572 | Java/Kotlin | java/call-to-thread-run | Direct call to a run() method |
CWE-573 | C/C++ | cpp/double-free | Potential double free |
CWE-573 | C/C++ | cpp/incorrectly-checked-scanf | Incorrect return-value check for a 'scanf'-like function |
CWE-573 | C/C++ | cpp/missing-check-scanf | Missing return-value check for a 'scanf'-like function |
CWE-573 | C/C++ | cpp/overflowing-snprintf | Potentially overflowing call to snprintf |
CWE-573 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-573 | C/C++ | cpp/wrong-type-format-argument | Wrong type of arguments to formatting function |
CWE-573 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-573 | C/C++ | cpp/ignore-return-value-sal | SAL requires inspecting return value |
CWE-573 | C/C++ | cpp/hresult-boolean-conversion | Cast between HRESULT and a Boolean type |
CWE-573 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-573 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-573 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-573 | C/C++ | cpp/work-with-changing-working-directories | Find work with changing working directories, with security errors. |
CWE-573 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-573 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-573 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-573 | C/C++ | cpp/double-release | Errors When Double Release |
CWE-573 | C# | cs/inconsistent-equals-and-gethashcode | Inconsistent Equals(object) and GetHashCode() |
CWE-573 | C# | cs/invalid-dynamic-call | Bad dynamic call |
CWE-573 | Java/Kotlin | java/ejb/container-interference | EJB interferes with container operation |
CWE-573 | Java/Kotlin | java/ejb/file-io | EJB uses file input/output |
CWE-573 | Java/Kotlin | java/ejb/graphics | EJB uses graphics |
CWE-573 | Java/Kotlin | java/ejb/native-code | EJB uses native code |
CWE-573 | Java/Kotlin | java/ejb/reflection | EJB uses reflection |
CWE-573 | Java/Kotlin | java/ejb/security-configuration-access | EJB accesses security configuration |
CWE-573 | Java/Kotlin | java/ejb/substitution-in-serialization | EJB uses substitution in serialization |
CWE-573 | Java/Kotlin | java/ejb/socket-or-stream-handler-factory | EJB sets socket factory or URL stream handler factory |
CWE-573 | Java/Kotlin | java/ejb/server-socket | EJB uses server socket |
CWE-573 | Java/Kotlin | java/ejb/non-final-static-field | EJB uses non-final static field |
CWE-573 | Java/Kotlin | java/ejb/synchronization | EJB uses synchronization |
CWE-573 | Java/Kotlin | java/ejb/this | EJB uses 'this' as argument or result |
CWE-573 | Java/Kotlin | java/ejb/threads | EJB uses threads |
CWE-573 | Java/Kotlin | java/missing-call-to-super-clone | Missing super clone |
CWE-573 | Java/Kotlin | java/inconsistent-equals-and-hashcode | Inconsistent equals and hashCode |
CWE-573 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-573 | Java/Kotlin | java/missing-super-finalize | Finalizer inconsistency |
CWE-573 | Java/Kotlin | java/missing-format-argument | Missing format argument |
CWE-573 | Java/Kotlin | java/unused-format-argument | Unused format argument |
CWE-573 | Java/Kotlin | java/static-initialization-vector | Using a static initialization vector for encryption |
CWE-573 | Java/Kotlin | java/empty-finalizer | Empty body of finalizer |
CWE-573 | JavaScript/TypeScript | js/superfluous-trailing-arguments | Superfluous trailing arguments |
CWE-573 | Python | py/equals-hash-mismatch | Inconsistent equality and hashing |
CWE-573 | Python | py/call/wrong-named-class-argument | Wrong name for an argument in a class instantiation |
CWE-573 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-573 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-573 | Python | py/call/wrong-named-argument | Wrong name for an argument in a call |
CWE-573 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-573 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-573 | Swift | swift/static-initialization-vector | Static initialization vector for encryption |
CWE-574 | Java/Kotlin | java/ejb/synchronization | EJB uses synchronization |
CWE-575 | Java/Kotlin | java/ejb/graphics | EJB uses graphics |
CWE-576 | Java/Kotlin | java/ejb/file-io | EJB uses file input/output |
CWE-577 | Java/Kotlin | java/ejb/socket-or-stream-handler-factory | EJB sets socket factory or URL stream handler factory |
CWE-577 | Java/Kotlin | java/ejb/server-socket | EJB uses server socket |
CWE-578 | Java/Kotlin | java/ejb/container-interference | EJB interferes with container operation |
CWE-580 | Java/Kotlin | java/missing-call-to-super-clone | Missing super clone |
CWE-581 | C# | cs/inconsistent-equals-and-gethashcode | Inconsistent Equals(object) and GetHashCode() |
CWE-581 | Java/Kotlin | java/inconsistent-equals-and-hashcode | Inconsistent equals and hashCode |
CWE-581 | Python | py/equals-hash-mismatch | Inconsistent equality and hashing |
CWE-582 | C# | cs/static-array | Array constant vulnerable to change |
CWE-582 | Java/Kotlin | java/static-array | Array constant vulnerable to change |
CWE-584 | Java/Kotlin | java/abnormal-finally-completion | Finally block may not complete normally |
CWE-584 | JavaScript/TypeScript | js/exit-from-finally | Jump from finally |
CWE-584 | Python | py/exit-from-finally | 'break' or 'return' statement in finally |
CWE-585 | C# | cs/empty-lock-statement | Empty lock statement |
CWE-585 | Java/Kotlin | java/empty-synchronized-block | Empty synchronized block |
CWE-592 | C/C++ | cpp/user-controlled-bypass | Authentication bypass by spoofing |
CWE-592 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-592 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-592 | Java/Kotlin | java/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-592 | Java/Kotlin | java/tainted-permissions-check | User-controlled data used in permissions check |
CWE-592 | JavaScript/TypeScript | js/user-controlled-bypass | User-controlled bypass of security check |
CWE-592 | JavaScript/TypeScript | js/different-kinds-comparison-bypass | Comparison of user-controlled data of different kinds |
CWE-592 | JavaScript/TypeScript | js/user-controlled-bypass-more-sources | User-controlled bypass of security check with additional heuristic sources |
CWE-592 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-595 | C# | cs/reference-equality-with-object | Reference equality test on System.Object |
CWE-595 | C# | cs/reference-equality-on-valuetypes | Call to ReferenceEquals(...) on value type expressions |
CWE-595 | Java/Kotlin | java/reference-equality-with-object | Reference equality test on java.lang.Object |
CWE-595 | Java/Kotlin | java/reference-equality-of-boxed-types | Reference equality test of boxed types |
CWE-595 | Java/Kotlin | java/reference-equality-on-strings | Reference equality test on strings |
CWE-597 | Java/Kotlin | java/reference-equality-on-strings | Reference equality test on strings |
CWE-598 | Java/Kotlin | java/sensitive-query-with-get | Sensitive GET Query |
CWE-598 | JavaScript/TypeScript | js/sensitive-get-query | Sensitive data read from GET request |
CWE-598 | Ruby | rb/sensitive-get-query | Sensitive data read from GET request |
CWE-600 | Java/Kotlin | java/uncaught-servlet-exception | Uncaught Servlet Exception |
CWE-601 | C# | cs/web/unvalidated-url-redirection | URL redirection from remote source |
CWE-601 | Go | go/bad-redirect-check | Bad redirect check |
CWE-601 | Go | go/unvalidated-url-redirection | Open URL redirect |
CWE-601 | Java/Kotlin | java/unvalidated-url-redirection | URL redirection from remote source |
CWE-601 | Java/Kotlin | java/spring-unvalidated-url-redirection | Spring url redirection from remote source |
CWE-601 | JavaScript/TypeScript | js/client-side-unvalidated-url-redirection | Client-side URL redirect |
CWE-601 | JavaScript/TypeScript | js/server-side-unvalidated-url-redirection | Server-side URL redirect |
CWE-601 | Python | py/url-redirection | URL redirection from remote source |
CWE-601 | Ruby | rb/url-redirection | URL redirection from remote source |
CWE-609 | C# | cs/unsafe-double-checked-lock | Double-checked lock is not thread-safe |
CWE-609 | Java/Kotlin | java/unsafe-double-checked-locking | Double-checked locking is not thread-safe |
CWE-609 | Java/Kotlin | java/unsafe-double-checked-locking-init-order | Race condition in double-checked locking object initialization |
CWE-609 | Java/Kotlin | java/lazy-initialization | Incorrect lazy initialization of a static field |
CWE-610 | C/C++ | cpp/path-injection | Uncontrolled data used in path expression |
CWE-610 | C/C++ | cpp/external-entity-expansion | XML external entity expansion |
CWE-610 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-610 | C# | cs/web/unvalidated-url-redirection | URL redirection from remote source |
CWE-610 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-610 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-610 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-610 | C# | cs/request-forgery | Server-side request forgery |
CWE-610 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-610 | Go | go/bad-redirect-check | Bad redirect check |
CWE-610 | Go | go/unvalidated-url-redirection | Open URL redirect |
CWE-610 | Go | go/request-forgery | Uncontrolled data used in network request |
CWE-610 | Go | go/ssrf | Uncontrolled data used in network request |
CWE-610 | Java/Kotlin | java/path-injection | Uncontrolled data used in path expression |
CWE-610 | Java/Kotlin | java/android/unsafe-content-uri-resolution | Uncontrolled data used in content resolution |
CWE-610 | Java/Kotlin | java/android/fragment-injection | Android fragment injection |
CWE-610 | Java/Kotlin | java/android/fragment-injection-preference-activity | Android fragment injection in PreferenceActivity |
CWE-610 | Java/Kotlin | java/unvalidated-url-redirection | URL redirection from remote source |
CWE-610 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-610 | Java/Kotlin | java/ssrf | Server-side request forgery |
CWE-610 | Java/Kotlin | java/file-path-injection | File Path Injection |
CWE-610 | Java/Kotlin | java/android/unsafe-reflection | Load 3rd party classes or code ('unsafe reflection') without signature check |
CWE-610 | Java/Kotlin | java/unsafe-reflection | Use of externally-controlled input to select classes or code ('unsafe reflection') |
CWE-610 | Java/Kotlin | java/spring-unvalidated-url-redirection | Spring url redirection from remote source |
CWE-610 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-610 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-610 | JavaScript/TypeScript | js/client-side-unvalidated-url-redirection | Client-side URL redirect |
CWE-610 | JavaScript/TypeScript | js/server-side-unvalidated-url-redirection | Server-side URL redirect |
CWE-610 | JavaScript/TypeScript | js/xxe | XML external entity expansion |
CWE-610 | JavaScript/TypeScript | js/client-side-request-forgery | Client-side request forgery |
CWE-610 | JavaScript/TypeScript | js/request-forgery | Server-side request forgery |
CWE-610 | JavaScript/TypeScript | javascript/ssrf | Uncontrolled data used in network request |
CWE-610 | JavaScript/TypeScript | js/xxe-more-sources | XML external entity expansion with additional heuristic sources |
CWE-610 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-610 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-610 | Python | py/url-redirection | URL redirection from remote source |
CWE-610 | Python | py/xxe | XML external entity expansion |
CWE-610 | Python | py/full-ssrf | Full server-side request forgery |
CWE-610 | Python | py/partial-ssrf | Partial server-side request forgery |
CWE-610 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-610 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-610 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-610 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-610 | Ruby | rb/url-redirection | URL redirection from remote source |
CWE-610 | Ruby | rb/xxe | XML external entity expansion |
CWE-610 | Ruby | rb/request-forgery | Server-side request forgery |
CWE-610 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-610 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-611 | C/C++ | cpp/external-entity-expansion | XML external entity expansion |
CWE-611 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-611 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-611 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-611 | JavaScript/TypeScript | js/xxe | XML external entity expansion |
CWE-611 | JavaScript/TypeScript | js/xxe-more-sources | XML external entity expansion with additional heuristic sources |
CWE-611 | Python | py/xxe | XML external entity expansion |
CWE-611 | Ruby | rb/xxe | XML external entity expansion |
CWE-611 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-614 | C# | cs/web/requiressl-not-set | 'requireSSL' attribute is not set to true |
CWE-614 | C# | cs/web/cookie-secure-not-set | 'Secure' attribute is not set to true |
CWE-614 | Java/Kotlin | java/insecure-cookie | Failure to use secure cookies |
CWE-614 | JavaScript/TypeScript | js/clear-text-cookie | Clear text transmission of sensitive cookie |
CWE-614 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-625 | Java/Kotlin | java/permissive-dot-regex | URL matched by permissive . in a regular expression |
CWE-625 | JavaScript/TypeScript | js/angular/insecure-url-whitelist | Insecure URL whitelist |
CWE-628 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-628 | C/C++ | cpp/wrong-type-format-argument | Wrong type of arguments to formatting function |
CWE-628 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-628 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-628 | C# | cs/invalid-dynamic-call | Bad dynamic call |
CWE-628 | Java/Kotlin | java/missing-format-argument | Missing format argument |
CWE-628 | Java/Kotlin | java/unused-format-argument | Unused format argument |
CWE-628 | JavaScript/TypeScript | js/superfluous-trailing-arguments | Superfluous trailing arguments |
CWE-628 | Python | py/call/wrong-named-class-argument | Wrong name for an argument in a class instantiation |
CWE-628 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-628 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-628 | Python | py/call/wrong-named-argument | Wrong name for an argument in a call |
CWE-628 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-628 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-639 | C# | cs/web/insecure-direct-object-reference | Insecure Direct Object Reference |
CWE-639 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-639 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-640 | Go | go/email-injection | Email content injection |
CWE-640 | JavaScript/TypeScript | js/host-header-forgery-in-email-generation | Host header poisoning in email generation |
CWE-642 | C/C++ | cpp/path-injection | Uncontrolled data used in path expression |
CWE-642 | C# | cs/web/html-hidden-input | Use of HTMLInputHidden |
CWE-642 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-642 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-642 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-642 | Java/Kotlin | java/path-injection | Uncontrolled data used in path expression |
CWE-642 | Java/Kotlin | java/file-path-injection | File Path Injection |
CWE-642 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-642 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-642 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-642 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-642 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-642 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-642 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-642 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-642 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-643 | C# | cs/xml/xpath-injection | XPath injection |
CWE-643 | Go | go/xml/xpath-injection | XPath injection |
CWE-643 | Java/Kotlin | java/xml/xpath-injection | XPath injection |
CWE-643 | JavaScript/TypeScript | js/xpath-injection | XPath injection |
CWE-643 | JavaScript/TypeScript | js/xpath-injection-more-sources | XPath injection with additional heuristic sources |
CWE-643 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-643 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-643 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-652 | Java/Kotlin | java/xquery-injection | XQuery query built from user-controlled sources |
CWE-657 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-657 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-657 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-657 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-657 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-657 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-657 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-657 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-657 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-657 | JavaScript/TypeScript | js/remote-property-injection | Remote property injection |
CWE-657 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-657 | JavaScript/TypeScript | js/remote-property-injection-more-sources | Remote property injection with additional heuristic sources |
CWE-657 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-657 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-657 | Swift | swift/constant-password | Constant password |
CWE-657 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-662 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-662 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-662 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-662 | C# | cs/unsafe-sync-on-field | Futile synchronization on field |
CWE-662 | C# | cs/inconsistent-lock-sequence | Inconsistent lock sequence |
CWE-662 | C# | cs/lock-this | Locking the 'this' object in a lock statement |
CWE-662 | C# | cs/locked-wait | A lock is held during a wait |
CWE-662 | C# | cs/unsynchronized-getter | Inconsistently synchronized property |
CWE-662 | C# | cs/unsafe-double-checked-lock | Double-checked lock is not thread-safe |
CWE-662 | C# | cs/unsynchronized-static-access | Unsynchronized access to static collection member in non-static context |
CWE-662 | Java/Kotlin | java/ejb/synchronization | EJB uses synchronization |
CWE-662 | Java/Kotlin | java/wait-on-condition-interface | Wait on condition |
CWE-662 | Java/Kotlin | java/call-to-thread-run | Direct call to a run() method |
CWE-662 | Java/Kotlin | java/unsafe-double-checked-locking | Double-checked locking is not thread-safe |
CWE-662 | Java/Kotlin | java/unsafe-double-checked-locking-init-order | Race condition in double-checked locking object initialization |
CWE-662 | Java/Kotlin | java/unsafe-sync-on-field | Futile synchronization on field |
CWE-662 | Java/Kotlin | java/inconsistent-field-synchronization | Inconsistent synchronization for field |
CWE-662 | Java/Kotlin | java/lazy-initialization | Incorrect lazy initialization of a static field |
CWE-662 | Java/Kotlin | java/non-sync-override | Non-synchronized override of synchronized method |
CWE-662 | Java/Kotlin | java/notify-instead-of-notify-all | notify instead of notifyAll |
CWE-662 | Java/Kotlin | java/sleep-with-lock-held | Sleep with lock held |
CWE-662 | Java/Kotlin | java/sync-on-boxed-types | Synchronization on boxed types or strings |
CWE-662 | Java/Kotlin | java/unsynchronized-getter | Inconsistent synchronization of getter and setter |
CWE-662 | Java/Kotlin | java/inconsistent-sync-writeobject | Inconsistent synchronization for writeObject() |
CWE-662 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-662 | Java/Kotlin | java/wait-with-two-locks | Wait with two locks held |
CWE-662 | Java/Kotlin | java/lock-order-inconsistency | Lock order inconsistency |
CWE-664 | C/C++ | cpp/catch-missing-free | Leaky catch |
CWE-664 | C/C++ | cpp/descriptor-may-not-be-closed | Open descriptor may not be closed |
CWE-664 | C/C++ | cpp/descriptor-never-closed | Open descriptor never closed |
CWE-664 | C/C++ | cpp/double-free | Potential double free |
CWE-664 | C/C++ | cpp/file-may-not-be-closed | Open file may not be closed |
CWE-664 | C/C++ | cpp/file-never-closed | Open file is not closed |
CWE-664 | C/C++ | cpp/global-use-before-init | Global variable may be used before initialization |
CWE-664 | C/C++ | cpp/initialization-not-run | Initialization code not run |
CWE-664 | C/C++ | cpp/memory-may-not-be-freed | Memory may not be freed |
CWE-664 | C/C++ | cpp/memory-never-freed | Memory is never freed |
CWE-664 | C/C++ | cpp/new-free-mismatch | Mismatching new/free or malloc/delete |
CWE-664 | C/C++ | cpp/not-initialised | Variable not initialized before use |
CWE-664 | C/C++ | cpp/use-after-free | Potential use after free |
CWE-664 | C/C++ | cpp/bad-addition-overflow-check | Bad check for overflow of integer addition |
CWE-664 | C/C++ | cpp/integer-multiplication-cast-to-long | Multiplication result converted to larger type |
CWE-664 | C/C++ | cpp/upcast-array-pointer-arithmetic | Upcast array used in pointer arithmetic |
CWE-664 | C/C++ | cpp/alloca-in-loop | Call to alloca in a loop |
CWE-664 | C/C++ | cpp/improper-null-termination | Potential improper null termination |
CWE-664 | C/C++ | cpp/return-stack-allocated-memory | Returning stack-allocated memory |
CWE-664 | C/C++ | cpp/uninitialized-local | Potentially uninitialized local variable |
CWE-664 | C/C++ | cpp/using-expired-stack-address | Use of expired stack-address |
CWE-664 | C/C++ | cpp/self-assignment-check | Self assignment check |
CWE-664 | C/C++ | cpp/path-injection | Uncontrolled data used in path expression |
CWE-664 | C/C++ | cpp/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-664 | C/C++ | cpp/integer-overflow-tainted | Potential integer arithmetic overflow |
CWE-664 | C/C++ | cpp/uncontrolled-allocation-size | Uncontrolled allocation size |
CWE-664 | C/C++ | cpp/user-controlled-bypass | Authentication bypass by spoofing |
CWE-664 | C/C++ | cpp/cleartext-storage-buffer | Cleartext storage of sensitive information in buffer |
CWE-664 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-664 | C/C++ | cpp/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-664 | C/C++ | cpp/cleartext-storage-database | Cleartext storage of sensitive information in an SQLite database |
CWE-664 | C/C++ | cpp/iterator-to-expired-container | Iterator to expired container |
CWE-664 | C/C++ | cpp/use-of-string-after-lifetime-ends | Use of string after lifetime ends |
CWE-664 | C/C++ | cpp/use-of-unique-pointer-after-lifetime-ends | Use of unique pointer after lifetime ends |
CWE-664 | C/C++ | cpp/unsafe-create-process-call | NULL application name with an unquoted path in call to CreateProcess |
CWE-664 | C/C++ | cpp/conditionally-uninitialized-variable | Conditionally uninitialized variable |
CWE-664 | C/C++ | cpp/system-data-exposure | Exposure of system data to an unauthorized control sphere |
CWE-664 | C/C++ | cpp/potential-system-data-exposure | Potential exposure of sensitive system data to an unauthorized control sphere |
CWE-664 | C/C++ | cpp/external-entity-expansion | XML external entity expansion |
CWE-664 | C/C++ | cpp/incorrect-string-type-conversion | Cast from char to wchar_t |
CWE-664 | C/C++ | cpp/world-writable-file-creation | File created without restricting permissions |
CWE-664 | C/C++ | cpp/open-call-with-mode-argument | File opened with O_CREAT flag but without mode argument |
CWE-664 | C/C++ | cpp/unsafe-dacl-security-descriptor | Setting a DACL to NULL in a SECURITY_DESCRIPTOR |
CWE-664 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-664 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-664 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-664 | C/C++ | cpp/type-confusion | Type confusion |
CWE-664 | C/C++ | cpp/work-with-file-without-permissions-rights | Writing to a file without setting permissions. |
CWE-664 | C/C++ | cpp/work-with-changing-working-directories | Find work with changing working directories, with security errors. |
CWE-664 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-664 | C/C++ | cpp/drop-linux-privileges-outoforder | LinuxPrivilegeDroppingOutoforder |
CWE-664 | C/C++ | cpp/pam-auth-bypass | PAM Authorization bypass |
CWE-664 | C/C++ | cpp/private-cleartext-write | Exposure of private information |
CWE-664 | C/C++ | cpp/insecure-generation-of-filename | Insecure generation of filenames. |
CWE-664 | C/C++ | cpp/memory-leak-on-failed-call-to-realloc | Memory leak on failed call to realloc |
CWE-664 | C/C++ | cpp/data-decompression-bomb | User-controlled file decompression |
CWE-664 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-664 | C/C++ | cpp/use-after-expired-lifetime | Use of object after its lifetime has ended |
CWE-664 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-664 | C/C++ | cpp/double-release | Errors When Double Release |
CWE-664 | C/C++ | cpp/improper-check-return-value-scanf | Improper check of return value of scanf |
CWE-664 | C/C++ | cpp/resource-not-released-in-destructor | Resource not released in destructor |
CWE-664 | C# | cs/dispose-not-called-on-throw | Dispose may not be called if an exception is thrown during execution |
CWE-664 | C# | cs/member-not-disposed | Missing Dispose call |
CWE-664 | C# | cs/missing-dispose-method | Missing Dispose method |
CWE-664 | C# | cs/local-not-disposed | Missing Dispose call on local IDisposable |
CWE-664 | C# | cs/class-name-comparison | Erroneous class compare |
CWE-664 | C# | cs/cast-from-abstract-to-concrete-collection | Cast from abstract to concrete collection |
CWE-664 | C# | cs/expose-implementation | Exposing internal representation |
CWE-664 | C# | cs/static-array | Array constant vulnerable to change |
CWE-664 | C# | cs/web/debug-code | ASP.NET: leftover debug code |
CWE-664 | C# | cs/web/html-hidden-input | Use of HTMLInputHidden |
CWE-664 | C# | cs/unsafe-sync-on-field | Futile synchronization on field |
CWE-664 | C# | cs/inconsistent-lock-sequence | Inconsistent lock sequence |
CWE-664 | C# | cs/lock-this | Locking the 'this' object in a lock statement |
CWE-664 | C# | cs/locked-wait | A lock is held during a wait |
CWE-664 | C# | cs/unsynchronized-getter | Inconsistently synchronized property |
CWE-664 | C# | cs/unsafe-double-checked-lock | Double-checked lock is not thread-safe |
CWE-664 | C# | cs/unsynchronized-static-access | Unsynchronized access to static collection member in non-static context |
CWE-664 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-664 | C# | cs/password-in-configuration | Password in configuration file |
CWE-664 | C# | cs/unassigned-field | Field is never assigned a non-default value |
CWE-664 | C# | cs/web/file-upload | Use of file upload |
CWE-664 | C# | cs/catch-of-all-exceptions | Generic catch clause |
CWE-664 | C# | cs/loss-of-precision | Possible loss of precision |
CWE-664 | C# | cs/web/debug-binary | Creating an ASP.NET debug binary may reveal sensitive information |
CWE-664 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-664 | C# | cs/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-664 | C# | cs/code-injection | Improper control of generation of code |
CWE-664 | C# | cs/sensitive-data-transmission | Information exposure through transmitted data |
CWE-664 | C# | cs/information-exposure-through-exception | Information exposure through an exception |
CWE-664 | C# | cs/web/missing-function-level-access-control | Missing function level access control |
CWE-664 | C# | cs/cleartext-storage-of-sensitive-information | Clear text storage of sensitive information |
CWE-664 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-664 | C# | cs/exposure-of-sensitive-information | Exposure of private information |
CWE-664 | C# | cs/session-reuse | Failure to abandon session |
CWE-664 | C# | cs/web/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-664 | C# | cs/deserialized-delegate | Deserialized delegate |
CWE-664 | C# | cs/unsafe-deserialization | Unsafe deserializer |
CWE-664 | C# | cs/unsafe-deserialization-untrusted-input | Deserialization of untrusted data |
CWE-664 | C# | cs/web/directory-browse-enabled | ASP.NET config file enables directory browsing |
CWE-664 | C# | cs/web/unvalidated-url-redirection | URL redirection from remote source |
CWE-664 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-664 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-664 | C# | cs/web/insecure-direct-object-reference | Insecure Direct Object Reference |
CWE-664 | C# | cs/redos | Denial of Service from comparison of user input against expensive regex |
CWE-664 | C# | cs/regex-injection | Regular expression injection |
CWE-664 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-664 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-664 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-664 | C# | cs/web/broad-cookie-domain | Cookie security: overly broad domain |
CWE-664 | C# | cs/web/broad-cookie-path | Cookie security: overly broad path |
CWE-664 | C# | cs/web/persistent-cookie | Cookie security: persistent cookie |
CWE-664 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-664 | C# | cs/request-forgery | Server-side request forgery |
CWE-664 | Go | go/shift-out-of-range | Shift out of range |
CWE-664 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-664 | Go | go/unsafe-unzip-symlink | Arbitrary file write extracting an archive containing symbolic links |
CWE-664 | Go | go/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-664 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-664 | Go | go/stack-trace-exposure | Information exposure through a stack trace |
CWE-664 | Go | go/clear-text-logging | Clear-text logging of sensitive information |
CWE-664 | Go | go/insecure-hostkeycallback | Use of insecure HostKeyCallback implementation |
CWE-664 | Go | go/bad-redirect-check | Bad redirect check |
CWE-664 | Go | go/unvalidated-url-redirection | Open URL redirect |
CWE-664 | Go | go/email-injection | Email content injection |
CWE-664 | Go | go/incorrect-integer-conversion | Incorrect conversion between integer types |
CWE-664 | Go | go/uncontrolled-allocation-size | Slice memory allocation with excessive size value |
CWE-664 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-664 | Go | go/request-forgery | Uncontrolled data used in network request |
CWE-664 | Go | go/timing-attack | Timing attacks due to comparison of sensitive secrets |
CWE-664 | Go | go/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-664 | Go | go/improper-ldap-auth | Improper LDAP Authentication |
CWE-664 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-664 | Go | go/uncontrolled-file-decompression | Uncontrolled file decompression |
CWE-664 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-664 | Go | go/ssrf | Uncontrolled data used in network request |
CWE-664 | Go | go/cors-misconfiguration | CORS misconfiguration |
CWE-664 | Java/Kotlin | java/ejb/synchronization | EJB uses synchronization |
CWE-664 | Java/Kotlin | java/implicit-cast-in-compound-assignment | Implicit narrowing conversion in compound assignment |
CWE-664 | Java/Kotlin | java/integer-multiplication-cast-to-long | Result of multiplication cast to wider type |
CWE-664 | Java/Kotlin | java/missing-call-to-super-clone | Missing super clone |
CWE-664 | Java/Kotlin | java/wait-on-condition-interface | Wait on condition |
CWE-664 | Java/Kotlin | java/call-to-thread-run | Direct call to a run() method |
CWE-664 | Java/Kotlin | java/unsafe-double-checked-locking | Double-checked locking is not thread-safe |
CWE-664 | Java/Kotlin | java/unsafe-double-checked-locking-init-order | Race condition in double-checked locking object initialization |
CWE-664 | Java/Kotlin | java/unsafe-sync-on-field | Futile synchronization on field |
CWE-664 | Java/Kotlin | java/inconsistent-field-synchronization | Inconsistent synchronization for field |
CWE-664 | Java/Kotlin | java/lazy-initialization | Incorrect lazy initialization of a static field |
CWE-664 | Java/Kotlin | java/non-sync-override | Non-synchronized override of synchronized method |
CWE-664 | Java/Kotlin | java/notify-instead-of-notify-all | notify instead of notifyAll |
CWE-664 | Java/Kotlin | java/sleep-with-lock-held | Sleep with lock held |
CWE-664 | Java/Kotlin | java/sync-on-boxed-types | Synchronization on boxed types or strings |
CWE-664 | Java/Kotlin | java/unsynchronized-getter | Inconsistent synchronization of getter and setter |
CWE-664 | Java/Kotlin | java/inconsistent-sync-writeobject | Inconsistent synchronization for writeObject() |
CWE-664 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-664 | Java/Kotlin | java/wait-with-two-locks | Wait with two locks held |
CWE-664 | Java/Kotlin | java/missing-super-finalize | Finalizer inconsistency |
CWE-664 | Java/Kotlin | java/input-resource-leak | Potential input resource leak |
CWE-664 | Java/Kotlin | java/database-resource-leak | Potential database resource leak |
CWE-664 | Java/Kotlin | java/output-resource-leak | Potential output resource leak |
CWE-664 | Java/Kotlin | java/impossible-array-cast | Impossible array cast |
CWE-664 | Java/Kotlin | java/path-injection | Uncontrolled data used in path expression |
CWE-664 | Java/Kotlin | java/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-664 | Java/Kotlin | java/partial-path-traversal | Partial path traversal vulnerability |
CWE-664 | Java/Kotlin | java/partial-path-traversal-from-remote | Partial path traversal vulnerability from remote |
CWE-664 | Java/Kotlin | java/exec-tainted-environment | Building a command with an injected environment variable |
CWE-664 | Java/Kotlin | java/android/arbitrary-apk-installation | Android APK installation |
CWE-664 | Java/Kotlin | java/groovy-injection | Groovy Language injection |
CWE-664 | Java/Kotlin | java/insecure-bean-validation | Insecure Bean Validation |
CWE-664 | Java/Kotlin | java/jexl-expression-injection | Expression language injection (JEXL) |
CWE-664 | Java/Kotlin | java/mvel-expression-injection | Expression language injection (MVEL) |
CWE-664 | Java/Kotlin | java/spel-expression-injection | Expression language injection (Spring) |
CWE-664 | Java/Kotlin | java/server-side-template-injection | Server-side template injection |
CWE-664 | Java/Kotlin | java/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-664 | Java/Kotlin | java/android/sensitive-notification | Exposure of sensitive information to notifications |
CWE-664 | Java/Kotlin | java/android/sensitive-text | Exposure of sensitive information to UI text views |
CWE-664 | Java/Kotlin | java/android/websettings-allow-content-access | Android WebView settings allows access to content links |
CWE-664 | Java/Kotlin | java/android/websettings-file-access | Android WebSettings file access |
CWE-664 | Java/Kotlin | java/local-temp-file-or-directory-information-disclosure | Local information disclosure in a temporary directory |
CWE-664 | Java/Kotlin | java/error-message-exposure | Information exposure through an error message |
CWE-664 | Java/Kotlin | java/stack-trace-exposure | Information exposure through a stack trace |
CWE-664 | Java/Kotlin | java/android/intent-uri-permission-manipulation | Intent URI permission manipulation |
CWE-664 | Java/Kotlin | java/unsafe-cert-trust | Unsafe certificate trust |
CWE-664 | Java/Kotlin | java/android/insecure-local-key-gen | Insecurely generated keys for local authentication |
CWE-664 | Java/Kotlin | java/android/insecure-local-authentication | Insecure local authentication |
CWE-664 | Java/Kotlin | java/insecure-smtp-ssl | Insecure JavaMail SSL Configuration |
CWE-664 | Java/Kotlin | java/unsafe-hostname-verification | Unsafe hostname verification |
CWE-664 | Java/Kotlin | java/android/backup-enabled | Application backup allowed |
CWE-664 | Java/Kotlin | java/android/cleartext-storage-database | Cleartext storage of sensitive information using a local database on Android |
CWE-664 | Java/Kotlin | java/android/cleartext-storage-filesystem | Cleartext storage of sensitive information in the Android filesystem |
CWE-664 | Java/Kotlin | java/cleartext-storage-in-class | Cleartext storage of sensitive information using storable class |
CWE-664 | Java/Kotlin | java/cleartext-storage-in-cookie | Cleartext storage of sensitive information in cookie |
CWE-664 | Java/Kotlin | java/cleartext-storage-in-properties | Cleartext storage of sensitive information using 'Properties' class |
CWE-664 | Java/Kotlin | java/android/cleartext-storage-shared-prefs | Cleartext storage of sensitive information using SharedPreferences on Android |
CWE-664 | Java/Kotlin | java/socket-auth-race-condition | Race condition in socket authentication |
CWE-664 | Java/Kotlin | java/android/unsafe-content-uri-resolution | Uncontrolled data used in content resolution |
CWE-664 | Java/Kotlin | java/android/fragment-injection | Android fragment injection |
CWE-664 | Java/Kotlin | java/android/fragment-injection-preference-activity | Android fragment injection in PreferenceActivity |
CWE-664 | Java/Kotlin | java/android/debuggable-attribute-enabled | Android debuggable attribute enabled |
CWE-664 | Java/Kotlin | java/android/webview-debugging-enabled | Android Webview debugging enabled |
CWE-664 | Java/Kotlin | java/trust-boundary-violation | Trust boundary violation |
CWE-664 | Java/Kotlin | java/unsafe-deserialization | Deserialization of user-controlled data |
CWE-664 | Java/Kotlin | java/insecure-basic-auth | Insecure basic authentication |
CWE-664 | Java/Kotlin | java/insecure-ldap-auth | Insecure LDAP authentication |
CWE-664 | Java/Kotlin | java/android/sensitive-keyboard-cache | Android sensitive keyboard cache |
CWE-664 | Java/Kotlin | java/sensitive-log | Insertion of sensitive information into log files |
CWE-664 | Java/Kotlin | java/unvalidated-url-forward | URL forward from a remote source |
CWE-664 | Java/Kotlin | java/unvalidated-url-redirection | URL redirection from remote source |
CWE-664 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-664 | Java/Kotlin | java/tainted-numeric-cast | User-controlled data in numeric cast |
CWE-664 | Java/Kotlin | java/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-664 | Java/Kotlin | java/redos | Inefficient regular expression |
CWE-664 | Java/Kotlin | java/regex-injection | Regular expression injection |
CWE-664 | Java/Kotlin | java/world-writable-file-read | Reading from a world writable file |
CWE-664 | Java/Kotlin | java/android/unsafe-android-webview-fetch | Unsafe resource fetching in Android WebView |
CWE-664 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-664 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-664 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-664 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-664 | Java/Kotlin | java/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-664 | Java/Kotlin | java/tainted-permissions-check | User-controlled data used in permissions check |
CWE-664 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-664 | Java/Kotlin | java/lock-order-inconsistency | Lock order inconsistency |
CWE-664 | Java/Kotlin | java/ssrf | Server-side request forgery |
CWE-664 | Java/Kotlin | java/improper-intent-verification | Improper verification of intent by broadcast receiver |
CWE-664 | Java/Kotlin | java/android/incomplete-provider-permissions | Missing read or write permission in a content provider |
CWE-664 | Java/Kotlin | java/android/implicitly-exported-component | Implicitly exported Android component |
CWE-664 | Java/Kotlin | java/android/implicit-pendingintents | Use of implicit PendingIntents |
CWE-664 | Java/Kotlin | java/android/sensitive-communication | Leaking sensitive information through an implicit Intent |
CWE-664 | Java/Kotlin | java/android/sensitive-result-receiver | Leaking sensitive information through a ResultReceiver |
CWE-664 | Java/Kotlin | java/android/intent-redirection | Android Intent redirection |
CWE-664 | Java/Kotlin | java/empty-finalizer | Empty body of finalizer |
CWE-664 | Java/Kotlin | java/unassigned-field | Field is never assigned a non-null value |
CWE-664 | Java/Kotlin | java/overly-general-catch | Overly-general catch clause |
CWE-664 | Java/Kotlin | java/abstract-to-concrete-cast | Cast from abstract to concrete collection |
CWE-664 | Java/Kotlin | java/internal-representation-exposure | Exposing internal representation |
CWE-664 | Java/Kotlin | java/static-array | Array constant vulnerable to change |
CWE-664 | Java/Kotlin | java/log4j-injection | Potential Log4J LDAP JNDI injection (CVE-2021-44228) |
CWE-664 | Java/Kotlin | java/openstream-called-on-tainted-url | openStream called on URLs created from remote source |
CWE-664 | Java/Kotlin | java/file-path-injection | File Path Injection |
CWE-664 | Java/Kotlin | java/beanshell-injection | BeanShell injection |
CWE-664 | Java/Kotlin | java/android-insecure-dex-loading | Insecure loading of an Android Dex File |
CWE-664 | Java/Kotlin | java/jshell-injection | JShell injection |
CWE-664 | Java/Kotlin | java/javaee-expression-injection | Jakarta Expression Language injection |
CWE-664 | Java/Kotlin | java/jython-injection | Injection in Jython |
CWE-664 | Java/Kotlin | java/unsafe-eval | Injection in Java Script Engine |
CWE-664 | Java/Kotlin | java/spring-view-manipulation-implicit | Spring Implicit View Manipulation |
CWE-664 | Java/Kotlin | java/spring-view-manipulation | Spring View Manipulation |
CWE-664 | Java/Kotlin | java/insecure-webview-resource-response | Insecure Android WebView Resource Response |
CWE-664 | Java/Kotlin | java/sensitive-android-file-leak | Leaking sensitive Android file |
CWE-664 | Java/Kotlin | java/possible-timing-attack-against-signature | Possible timing attack against signature validation |
CWE-664 | Java/Kotlin | java/timing-attack-against-headers-value | Timing attack against header value |
CWE-664 | Java/Kotlin | java/timing-attack-against-signature | Timing attack against signature validation |
CWE-664 | Java/Kotlin | java/ignored-hostname-verification | Ignored result of hostname verification |
CWE-664 | Java/Kotlin | java/insecure-ldaps-endpoint | Insecure LDAPS Endpoint Configuration |
CWE-664 | Java/Kotlin | java/disabled-certificate-revocation-checking | Disabled certificate revocation checking |
CWE-664 | Java/Kotlin | java/unvalidated-cors-origin-set | CORS is derived from untrusted input |
CWE-664 | Java/Kotlin | java/local-thread-resource-abuse | Uncontrolled thread resource consumption from local input source |
CWE-664 | Java/Kotlin | java/thread-resource-abuse | Uncontrolled thread resource consumption |
CWE-664 | Java/Kotlin | java/android/unsafe-reflection | Load 3rd party classes or code ('unsafe reflection') without signature check |
CWE-664 | Java/Kotlin | java/unsafe-reflection | Use of externally-controlled input to select classes or code ('unsafe reflection') |
CWE-664 | Java/Kotlin | java/main-method-in-enterprise-bean | Main Method in Enterprise Java Bean |
CWE-664 | Java/Kotlin | java/main-method-in-web-components | Main Method in Java EE Web Components |
CWE-664 | Java/Kotlin | java/struts-development-mode | Apache Struts development mode enabled |
CWE-664 | Java/Kotlin | java/unsafe-deserialization-rmi | Unsafe deserialization in a remotely callable method. |
CWE-664 | Java/Kotlin | java/unsafe-deserialization-spring-exporter-in-configuration-class | Unsafe deserialization with Spring's remote service exporters. |
CWE-664 | Java/Kotlin | java/unsafe-deserialization-spring-exporter-in-xml-configuration | Unsafe deserialization with Spring's remote service exporters. |
CWE-664 | Java/Kotlin | java/uncontrolled-file-decompression | Uncontrolled file decompression |
CWE-664 | Java/Kotlin | java/server-directory-listing | Directories and files exposure |
CWE-664 | Java/Kotlin | java/credentials-in-properties | Cleartext Credentials in Properties File |
CWE-664 | Java/Kotlin | java/password-in-configuration | Password in configuration file |
CWE-664 | Java/Kotlin | java/sensitive-query-with-get | Sensitive GET Query |
CWE-664 | Java/Kotlin | java/spring-unvalidated-url-redirection | Spring url redirection from remote source |
CWE-664 | Java/Kotlin | java/permissive-dot-regex | URL matched by permissive . in a regular expression |
CWE-664 | Java/Kotlin | java/insecure-rmi-jmx-server-initialization | InsecureRmiJmxAuthenticationEnvironment |
CWE-664 | Java/Kotlin | java/incorrect-url-verification | Incorrect URL verification |
CWE-664 | JavaScript/TypeScript | js/alert-call | Invocation of alert |
CWE-664 | JavaScript/TypeScript | js/unsafe-external-link | Potentially unsafe external link |
CWE-664 | JavaScript/TypeScript | js/enabling-electron-insecure-content | Enabling Electron allowRunningInsecureContent |
CWE-664 | JavaScript/TypeScript | js/enabling-electron-renderer-node-integration | Enabling Node.js integration for Electron web content renderers |
CWE-664 | JavaScript/TypeScript | js/implicit-operand-conversion | Implicit operand conversion |
CWE-664 | JavaScript/TypeScript | js/shift-out-of-range | Shift out of range |
CWE-664 | JavaScript/TypeScript | js/debugger-statement | Use of debugger statement |
CWE-664 | JavaScript/TypeScript | js/invalid-prototype-value | Invalid prototype value |
CWE-664 | JavaScript/TypeScript | js/property-assignment-on-primitive | Assignment to property of primitive value |
CWE-664 | JavaScript/TypeScript | js/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-664 | JavaScript/TypeScript | js/redos | Inefficient regular expression |
CWE-664 | JavaScript/TypeScript | js/missing-origin-check | Missing origin verification in postMessage handler |
CWE-664 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-664 | JavaScript/TypeScript | js/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-664 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-664 | JavaScript/TypeScript | js/code-injection | Code injection |
CWE-664 | JavaScript/TypeScript | js/actions/command-injection | Expression injection in Actions |
CWE-664 | JavaScript/TypeScript | js/bad-code-sanitization | Improper code sanitization |
CWE-664 | JavaScript/TypeScript | js/unsafe-code-construction | Unsafe code constructed from library input |
CWE-664 | JavaScript/TypeScript | js/unsafe-dynamic-method-access | Unsafe dynamic method access |
CWE-664 | JavaScript/TypeScript | js/case-sensitive-middleware-path | Case-sensitive middleware path |
CWE-664 | JavaScript/TypeScript | js/file-access-to-http | File data in outbound network request |
CWE-664 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-664 | JavaScript/TypeScript | js/cross-window-information-leak | Cross-window communication with unrestricted target origin |
CWE-664 | JavaScript/TypeScript | js/stack-trace-exposure | Information exposure through a stack trace |
CWE-664 | JavaScript/TypeScript | js/disabling-certificate-validation | Disabling certificate validation |
CWE-664 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-664 | JavaScript/TypeScript | js/actions/actions-artifact-leak | Storage of sensitive information in GitHub Actions artifact |
CWE-664 | JavaScript/TypeScript | js/build-artifact-leak | Storage of sensitive information in build artifact |
CWE-664 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-664 | JavaScript/TypeScript | js/clear-text-storage-of-sensitive-data | Clear text storage of sensitive information |
CWE-664 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-664 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-664 | JavaScript/TypeScript | js/insecure-temporary-file | Insecure temporary file |
CWE-664 | JavaScript/TypeScript | js/session-fixation | Failure to abandon session |
CWE-664 | JavaScript/TypeScript | js/resource-exhaustion-from-deep-object-traversal | Resources exhaustion from deep object traversal |
CWE-664 | JavaScript/TypeScript | js/remote-property-injection | Remote property injection |
CWE-664 | JavaScript/TypeScript | js/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-664 | JavaScript/TypeScript | js/unsafe-deserialization | Deserialization of user-controlled data |
CWE-664 | JavaScript/TypeScript | js/sensitive-get-query | Sensitive data read from GET request |
CWE-664 | JavaScript/TypeScript | js/client-side-unvalidated-url-redirection | Client-side URL redirect |
CWE-664 | JavaScript/TypeScript | js/server-side-unvalidated-url-redirection | Server-side URL redirect |
CWE-664 | JavaScript/TypeScript | js/xxe | XML external entity expansion |
CWE-664 | JavaScript/TypeScript | js/clear-text-cookie | Clear text transmission of sensitive cookie |
CWE-664 | JavaScript/TypeScript | js/host-header-forgery-in-email-generation | Host header poisoning in email generation |
CWE-664 | JavaScript/TypeScript | js/regex-injection | Regular expression injection |
CWE-664 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-664 | JavaScript/TypeScript | js/resource-exhaustion | Resource exhaustion |
CWE-664 | JavaScript/TypeScript | js/xml-bomb | XML internal entity expansion |
CWE-664 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-664 | JavaScript/TypeScript | js/user-controlled-bypass | User-controlled bypass of security check |
CWE-664 | JavaScript/TypeScript | js/different-kinds-comparison-bypass | Comparison of user-controlled data of different kinds |
CWE-664 | JavaScript/TypeScript | js/insecure-download | Download of sensitive file through insecure connection |
CWE-664 | JavaScript/TypeScript | js/functionality-from-untrusted-domain | Untrusted domain used in script or other content |
CWE-664 | JavaScript/TypeScript | js/functionality-from-untrusted-source | Inclusion of functionality from an untrusted source |
CWE-664 | JavaScript/TypeScript | js/type-confusion-through-parameter-tampering | Type confusion through parameter tampering |
CWE-664 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-664 | JavaScript/TypeScript | js/http-to-file-access | Network data written to file |
CWE-664 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-664 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-664 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-664 | JavaScript/TypeScript | js/client-side-request-forgery | Client-side request forgery |
CWE-664 | JavaScript/TypeScript | js/request-forgery | Server-side request forgery |
CWE-664 | JavaScript/TypeScript | js/code-injection-dynamic-import | Code injection |
CWE-664 | JavaScript/TypeScript | js/actions/pull-request-target | Checkout of untrusted code in trusted context |
CWE-664 | JavaScript/TypeScript | js/user-controlled-data-decompression | User-controlled file decompression |
CWE-664 | JavaScript/TypeScript | javascript/ssrf | Uncontrolled data used in network request |
CWE-664 | JavaScript/TypeScript | js/cors-misconfiguration | overly CORS configuration |
CWE-664 | JavaScript/TypeScript | js/code-injection-more-sources | Code injection with additional heuristic sources |
CWE-664 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-664 | JavaScript/TypeScript | js/remote-property-injection-more-sources | Remote property injection with additional heuristic sources |
CWE-664 | JavaScript/TypeScript | js/unsafe-deserialization-more-sources | Deserialization of user-controlled data with additional heuristic sources |
CWE-664 | JavaScript/TypeScript | js/xxe-more-sources | XML external entity expansion with additional heuristic sources |
CWE-664 | JavaScript/TypeScript | js/regex-injection-more-sources | Regular expression injection with additional heuristic sources |
CWE-664 | JavaScript/TypeScript | js/resource-exhaustion-more-sources | Resource exhaustion with additional heuristic sources |
CWE-664 | JavaScript/TypeScript | js/xml-bomb-more-sources | XML internal entity expansion with additional heuristic sources |
CWE-664 | JavaScript/TypeScript | js/user-controlled-bypass-more-sources | User-controlled bypass of security check with additional heuristic sources |
CWE-664 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-664 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-664 | Python | py/implicit-string-concatenation-in-list | Implicit string concatenation in a list |
CWE-664 | Python | py/file-not-closed | File is not always closed |
CWE-664 | Python | py/bind-socket-all-network-interfaces | Binding a socket to all network interfaces |
CWE-664 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-664 | Python | py/tarslip | Arbitrary file write during tarfile extraction |
CWE-664 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-664 | Python | py/code-injection | Code injection |
CWE-664 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-664 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-664 | Python | py/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-664 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-664 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-664 | Python | py/insecure-temporary-file | Insecure temporary file |
CWE-664 | Python | py/unsafe-deserialization | Deserialization of user-controlled data |
CWE-664 | Python | py/url-redirection | URL redirection from remote source |
CWE-664 | Python | py/xxe | XML external entity expansion |
CWE-664 | Python | py/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-664 | Python | py/redos | Inefficient regular expression |
CWE-664 | Python | py/regex-injection | Regular expression injection |
CWE-664 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-664 | Python | py/xml-bomb | XML internal entity expansion |
CWE-664 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-664 | Python | py/full-ssrf | Full server-side request forgery |
CWE-664 | Python | py/partial-ssrf | Partial server-side request forgery |
CWE-664 | Python | py/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-664 | Python | py/tarslip-extended | Arbitrary file write during tarfile extraction |
CWE-664 | Python | py/unsafe-unpacking | Arbitrary file write during a tarball extraction from a user controlled source |
CWE-664 | Python | py/js2py-rce | JavaScript code execution. |
CWE-664 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-664 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-664 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-664 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-664 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-664 | Python | py/flask-constant-secret-key | Initializing SECRET_KEY of Flask application with Constant value |
CWE-664 | Python | py/improper-ldap-auth | Improper LDAP Authentication |
CWE-664 | Python | py/decompression-bomb | Decompression Bomb |
CWE-664 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-664 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-664 | Python | py/unicode-dos | Denial of Service using Unicode Characters |
CWE-664 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-664 | Ruby | rb/user-controlled-data-decompression | User-controlled file decompression |
CWE-664 | Ruby | rb/zip-slip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-664 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-664 | Ruby | rb/unsafe-unsafeyamldeserialization | Deserialization of user-controlled yaml data |
CWE-664 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-664 | Ruby | rb/user-controlled-file-decompression | User-controlled file decompression |
CWE-664 | Ruby | rb/improper-ldap-auth | Improper LDAP Authentication |
CWE-664 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-664 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-664 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-664 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-664 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-664 | Ruby | rb/code-injection | Code injection |
CWE-664 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-664 | Ruby | rb/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-664 | Ruby | rb/redos | Inefficient regular expression |
CWE-664 | Ruby | rb/regexp-injection | Regular expression injection |
CWE-664 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-664 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-664 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-664 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-664 | Ruby | rb/unsafe-deserialization | Deserialization of user-controlled data |
CWE-664 | Ruby | rb/sensitive-get-query | Sensitive data read from GET request |
CWE-664 | Ruby | rb/url-redirection | URL redirection from remote source |
CWE-664 | Ruby | rb/xxe | XML external entity expansion |
CWE-664 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-664 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-664 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-664 | Ruby | rb/insecure-download | Download of sensitive file through insecure connection |
CWE-664 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-664 | Ruby | rb/insecure-mass-assignment | Insecure Mass Assignment |
CWE-664 | Ruby | rb/request-forgery | Server-side request forgery |
CWE-664 | Swift | swift/unsafe-unpacking | Arbitrary file write during a zip extraction from a user controlled source |
CWE-664 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-664 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-664 | Swift | swift/unsafe-js-eval | JavaScript Injection |
CWE-664 | Swift | swift/redos | Inefficient regular expression |
CWE-664 | Swift | swift/constant-password | Constant password |
CWE-664 | Swift | swift/cleartext-storage-database | Cleartext storage of sensitive information in a local database |
CWE-664 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-664 | Swift | swift/cleartext-storage-preferences | Cleartext storage of sensitive information in an application preference store |
CWE-664 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-664 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-664 | Swift | swift/regex-injection | Regular expression injection |
CWE-665 | C/C++ | cpp/global-use-before-init | Global variable may be used before initialization |
CWE-665 | C/C++ | cpp/initialization-not-run | Initialization code not run |
CWE-665 | C/C++ | cpp/not-initialised | Variable not initialized before use |
CWE-665 | C/C++ | cpp/alloca-in-loop | Call to alloca in a loop |
CWE-665 | C/C++ | cpp/improper-null-termination | Potential improper null termination |
CWE-665 | C/C++ | cpp/uninitialized-local | Potentially uninitialized local variable |
CWE-665 | C/C++ | cpp/uncontrolled-allocation-size | Uncontrolled allocation size |
CWE-665 | C/C++ | cpp/conditionally-uninitialized-variable | Conditionally uninitialized variable |
CWE-665 | C# | cs/unassigned-field | Field is never assigned a non-default value |
CWE-665 | Go | go/uncontrolled-allocation-size | Slice memory allocation with excessive size value |
CWE-665 | Java/Kotlin | java/exec-tainted-environment | Building a command with an injected environment variable |
CWE-665 | Java/Kotlin | java/unassigned-field | Field is never assigned a non-null value |
CWE-665 | Java/Kotlin | java/insecure-rmi-jmx-server-initialization | InsecureRmiJmxAuthenticationEnvironment |
CWE-665 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-665 | JavaScript/TypeScript | js/resource-exhaustion | Resource exhaustion |
CWE-665 | JavaScript/TypeScript | js/resource-exhaustion-more-sources | Resource exhaustion with additional heuristic sources |
CWE-665 | Python | py/implicit-string-concatenation-in-list | Implicit string concatenation in a list |
CWE-665 | Python | py/unicode-dos | Denial of Service using Unicode Characters |
CWE-666 | C/C++ | cpp/double-free | Potential double free |
CWE-666 | C/C++ | cpp/use-after-free | Potential use after free |
CWE-666 | C/C++ | cpp/return-stack-allocated-memory | Returning stack-allocated memory |
CWE-666 | C/C++ | cpp/using-expired-stack-address | Use of expired stack-address |
CWE-666 | C/C++ | cpp/self-assignment-check | Self assignment check |
CWE-666 | C/C++ | cpp/iterator-to-expired-container | Iterator to expired container |
CWE-666 | C/C++ | cpp/use-of-string-after-lifetime-ends | Use of string after lifetime ends |
CWE-666 | C/C++ | cpp/use-of-unique-pointer-after-lifetime-ends | Use of unique pointer after lifetime ends |
CWE-666 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-666 | C/C++ | cpp/use-after-expired-lifetime | Use of object after its lifetime has ended |
CWE-666 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-666 | C/C++ | cpp/double-release | Errors When Double Release |
CWE-667 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-667 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-667 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-667 | C# | cs/locked-wait | A lock is held during a wait |
CWE-667 | C# | cs/unsafe-double-checked-lock | Double-checked lock is not thread-safe |
CWE-667 | Java/Kotlin | java/unsafe-double-checked-locking | Double-checked locking is not thread-safe |
CWE-667 | Java/Kotlin | java/unsafe-double-checked-locking-init-order | Race condition in double-checked locking object initialization |
CWE-667 | Java/Kotlin | java/lazy-initialization | Incorrect lazy initialization of a static field |
CWE-667 | Java/Kotlin | java/sleep-with-lock-held | Sleep with lock held |
CWE-667 | Java/Kotlin | java/unsynchronized-getter | Inconsistent synchronization of getter and setter |
CWE-667 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-667 | Java/Kotlin | java/wait-with-two-locks | Wait with two locks held |
CWE-667 | Java/Kotlin | java/lock-order-inconsistency | Lock order inconsistency |
CWE-668 | C/C++ | cpp/path-injection | Uncontrolled data used in path expression |
CWE-668 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-668 | C/C++ | cpp/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-668 | C/C++ | cpp/unsafe-create-process-call | NULL application name with an unquoted path in call to CreateProcess |
CWE-668 | C/C++ | cpp/system-data-exposure | Exposure of system data to an unauthorized control sphere |
CWE-668 | C/C++ | cpp/potential-system-data-exposure | Potential exposure of sensitive system data to an unauthorized control sphere |
CWE-668 | C/C++ | cpp/world-writable-file-creation | File created without restricting permissions |
CWE-668 | C/C++ | cpp/open-call-with-mode-argument | File opened with O_CREAT flag but without mode argument |
CWE-668 | C/C++ | cpp/unsafe-dacl-security-descriptor | Setting a DACL to NULL in a SECURITY_DESCRIPTOR |
CWE-668 | C/C++ | cpp/work-with-file-without-permissions-rights | Writing to a file without setting permissions. |
CWE-668 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-668 | C/C++ | cpp/private-cleartext-write | Exposure of private information |
CWE-668 | C/C++ | cpp/insecure-generation-of-filename | Insecure generation of filenames. |
CWE-668 | C# | cs/static-array | Array constant vulnerable to change |
CWE-668 | C# | cs/web/html-hidden-input | Use of HTMLInputHidden |
CWE-668 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-668 | C# | cs/password-in-configuration | Password in configuration file |
CWE-668 | C# | cs/web/debug-binary | Creating an ASP.NET debug binary may reveal sensitive information |
CWE-668 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-668 | C# | cs/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-668 | C# | cs/sensitive-data-transmission | Information exposure through transmitted data |
CWE-668 | C# | cs/information-exposure-through-exception | Information exposure through an exception |
CWE-668 | C# | cs/cleartext-storage-of-sensitive-information | Clear text storage of sensitive information |
CWE-668 | C# | cs/exposure-of-sensitive-information | Exposure of private information |
CWE-668 | C# | cs/web/directory-browse-enabled | ASP.NET config file enables directory browsing |
CWE-668 | C# | cs/web/persistent-cookie | Cookie security: persistent cookie |
CWE-668 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-668 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-668 | Go | go/unsafe-unzip-symlink | Arbitrary file write extracting an archive containing symbolic links |
CWE-668 | Go | go/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-668 | Go | go/stack-trace-exposure | Information exposure through a stack trace |
CWE-668 | Go | go/clear-text-logging | Clear-text logging of sensitive information |
CWE-668 | Go | go/timing-attack | Timing attacks due to comparison of sensitive secrets |
CWE-668 | Go | go/cors-misconfiguration | CORS misconfiguration |
CWE-668 | Java/Kotlin | java/path-injection | Uncontrolled data used in path expression |
CWE-668 | Java/Kotlin | java/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-668 | Java/Kotlin | java/partial-path-traversal | Partial path traversal vulnerability |
CWE-668 | Java/Kotlin | java/partial-path-traversal-from-remote | Partial path traversal vulnerability from remote |
CWE-668 | Java/Kotlin | java/android/sensitive-notification | Exposure of sensitive information to notifications |
CWE-668 | Java/Kotlin | java/android/sensitive-text | Exposure of sensitive information to UI text views |
CWE-668 | Java/Kotlin | java/android/websettings-allow-content-access | Android WebView settings allows access to content links |
CWE-668 | Java/Kotlin | java/android/websettings-file-access | Android WebSettings file access |
CWE-668 | Java/Kotlin | java/local-temp-file-or-directory-information-disclosure | Local information disclosure in a temporary directory |
CWE-668 | Java/Kotlin | java/error-message-exposure | Information exposure through an error message |
CWE-668 | Java/Kotlin | java/stack-trace-exposure | Information exposure through a stack trace |
CWE-668 | Java/Kotlin | java/insecure-basic-auth | Insecure basic authentication |
CWE-668 | Java/Kotlin | java/insecure-ldap-auth | Insecure LDAP authentication |
CWE-668 | Java/Kotlin | java/android/sensitive-keyboard-cache | Android sensitive keyboard cache |
CWE-668 | Java/Kotlin | java/sensitive-log | Insertion of sensitive information into log files |
CWE-668 | Java/Kotlin | java/unvalidated-url-forward | URL forward from a remote source |
CWE-668 | Java/Kotlin | java/world-writable-file-read | Reading from a world writable file |
CWE-668 | Java/Kotlin | java/android/implicit-pendingintents | Use of implicit PendingIntents |
CWE-668 | Java/Kotlin | java/android/sensitive-communication | Leaking sensitive information through an implicit Intent |
CWE-668 | Java/Kotlin | java/android/sensitive-result-receiver | Leaking sensitive information through a ResultReceiver |
CWE-668 | Java/Kotlin | java/static-array | Array constant vulnerable to change |
CWE-668 | Java/Kotlin | java/openstream-called-on-tainted-url | openStream called on URLs created from remote source |
CWE-668 | Java/Kotlin | java/file-path-injection | File Path Injection |
CWE-668 | Java/Kotlin | java/insecure-webview-resource-response | Insecure Android WebView Resource Response |
CWE-668 | Java/Kotlin | java/sensitive-android-file-leak | Leaking sensitive Android file |
CWE-668 | Java/Kotlin | java/possible-timing-attack-against-signature | Possible timing attack against signature validation |
CWE-668 | Java/Kotlin | java/timing-attack-against-headers-value | Timing attack against header value |
CWE-668 | Java/Kotlin | java/timing-attack-against-signature | Timing attack against signature validation |
CWE-668 | Java/Kotlin | java/server-directory-listing | Directories and files exposure |
CWE-668 | Java/Kotlin | java/credentials-in-properties | Cleartext Credentials in Properties File |
CWE-668 | Java/Kotlin | java/password-in-configuration | Password in configuration file |
CWE-668 | Java/Kotlin | java/sensitive-query-with-get | Sensitive GET Query |
CWE-668 | JavaScript/TypeScript | js/unsafe-external-link | Potentially unsafe external link |
CWE-668 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-668 | JavaScript/TypeScript | js/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-668 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-668 | JavaScript/TypeScript | js/file-access-to-http | File data in outbound network request |
CWE-668 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-668 | JavaScript/TypeScript | js/cross-window-information-leak | Cross-window communication with unrestricted target origin |
CWE-668 | JavaScript/TypeScript | js/stack-trace-exposure | Information exposure through a stack trace |
CWE-668 | JavaScript/TypeScript | js/actions/actions-artifact-leak | Storage of sensitive information in GitHub Actions artifact |
CWE-668 | JavaScript/TypeScript | js/build-artifact-leak | Storage of sensitive information in build artifact |
CWE-668 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-668 | JavaScript/TypeScript | js/clear-text-storage-of-sensitive-data | Clear text storage of sensitive information |
CWE-668 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-668 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-668 | JavaScript/TypeScript | js/insecure-temporary-file | Insecure temporary file |
CWE-668 | JavaScript/TypeScript | js/sensitive-get-query | Sensitive data read from GET request |
CWE-668 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-668 | JavaScript/TypeScript | js/user-controlled-data-decompression | User-controlled file decompression |
CWE-668 | JavaScript/TypeScript | js/cors-misconfiguration | overly CORS configuration |
CWE-668 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-668 | Python | py/bind-socket-all-network-interfaces | Binding a socket to all network interfaces |
CWE-668 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-668 | Python | py/tarslip | Arbitrary file write during tarfile extraction |
CWE-668 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-668 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-668 | Python | py/flask-debug | Flask app is run in debug mode |
CWE-668 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-668 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-668 | Python | py/insecure-temporary-file | Insecure temporary file |
CWE-668 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-668 | Python | py/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-668 | Python | py/tarslip-extended | Arbitrary file write during tarfile extraction |
CWE-668 | Python | py/unsafe-unpacking | Arbitrary file write during a tarball extraction from a user controlled source |
CWE-668 | Python | py/possible-timing-attack-against-hash | Timing attack against Hash |
CWE-668 | Python | py/timing-attack-against-hash | Timing attack against Hash |
CWE-668 | Python | py/timing-attack-against-header-value | Timing attack against header value |
CWE-668 | Python | py/possible-timing-attack-sensitive-info | Timing attack against secret |
CWE-668 | Python | py/timing-attack-sensitive-info | Timing attack against secret |
CWE-668 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-668 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-668 | Ruby | rb/zip-slip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-668 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-668 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-668 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-668 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-668 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-668 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-668 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-668 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-668 | Ruby | rb/sensitive-get-query | Sensitive data read from GET request |
CWE-668 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-668 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-668 | Swift | swift/unsafe-unpacking | Arbitrary file write during a zip extraction from a user controlled source |
CWE-668 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-668 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-669 | C/C++ | cpp/work-with-changing-working-directories | Find work with changing working directories, with security errors. |
CWE-669 | C# | cs/web/file-upload | Use of file upload |
CWE-669 | C# | cs/web/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-669 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-669 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-669 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-669 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-669 | JavaScript/TypeScript | js/enabling-electron-insecure-content | Enabling Electron allowRunningInsecureContent |
CWE-669 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-669 | JavaScript/TypeScript | js/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-669 | JavaScript/TypeScript | js/xxe | XML external entity expansion |
CWE-669 | JavaScript/TypeScript | js/insecure-download | Download of sensitive file through insecure connection |
CWE-669 | JavaScript/TypeScript | js/functionality-from-untrusted-domain | Untrusted domain used in script or other content |
CWE-669 | JavaScript/TypeScript | js/functionality-from-untrusted-source | Inclusion of functionality from an untrusted source |
CWE-669 | JavaScript/TypeScript | js/http-to-file-access | Network data written to file |
CWE-669 | JavaScript/TypeScript | js/xxe-more-sources | XML external entity expansion with additional heuristic sources |
CWE-669 | Python | py/xxe | XML external entity expansion |
CWE-669 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-669 | Ruby | rb/xxe | XML external entity expansion |
CWE-669 | Ruby | rb/insecure-download | Download of sensitive file through insecure connection |
CWE-669 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-669 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-670 | C/C++ | cpp/comma-before-misleading-indentation | Comma before misleading indentation |
CWE-670 | C/C++ | cpp/assign-where-compare-meant | Assignment where comparison was intended |
CWE-670 | C/C++ | cpp/compare-where-assign-meant | Comparison where assignment was intended |
CWE-670 | C/C++ | cpp/incorrect-not-operator-usage | Incorrect 'not' operator usage |
CWE-670 | C/C++ | cpp/logical-operator-applied-to-flag | Short-circuiting operator applied to flag |
CWE-670 | C/C++ | cpp/unsafe-use-of-this | Unsafe use of this in constructor |
CWE-670 | C/C++ | cpp/dangerous-use-of-ssl-shutdown | Dangerous use SSL_shutdown. |
CWE-670 | C/C++ | cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations | Operator Precedence Logic Error When Use Bitwise Or Logical Operations |
CWE-670 | C/C++ | cpp/operator-precedence-logic-error-when-use-bool-type | Operator Precedence Logic Error When Use Bool Type |
CWE-670 | C# | cs/non-short-circuit | Potentially dangerous use of non-short-circuit logic |
CWE-670 | Go | go/whitespace-contradicts-precedence | Whitespace contradicts operator precedence |
CWE-670 | Go | go/useless-expression | Expression has no effect |
CWE-670 | Go | go/redundant-operation | Identical operands |
CWE-670 | Go | go/redundant-assignment | Self assignment |
CWE-670 | Java/Kotlin | java/whitespace-contradicts-precedence | Whitespace contradicts operator precedence |
CWE-670 | Java/Kotlin | java/assignment-in-boolean-expression | Assignment in Boolean expression |
CWE-670 | Java/Kotlin | java/reference-equality-on-strings | Reference equality test on strings |
CWE-670 | Java/Kotlin | java/switch-fall-through | Unterminated switch case |
CWE-670 | JavaScript/TypeScript | js/useless-expression | Expression has no effect |
CWE-670 | JavaScript/TypeScript | js/redundant-operation | Identical operands |
CWE-670 | JavaScript/TypeScript | js/redundant-assignment | Self assignment |
CWE-670 | JavaScript/TypeScript | js/unclear-operator-precedence | Unclear precedence of nested operators |
CWE-670 | JavaScript/TypeScript | js/whitespace-contradicts-precedence | Whitespace contradicts operator precedence |
CWE-670 | JavaScript/TypeScript | js/deletion-of-non-property | Deleting non-property |
CWE-670 | JavaScript/TypeScript | js/misleading-indentation-of-dangling-else | Misleading indentation of dangling 'else' |
CWE-670 | JavaScript/TypeScript | js/misleading-indentation-after-control-statement | Misleading indentation after control statement |
CWE-670 | Python | py/asserts-tuple | Asserting a tuple |
CWE-671 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-671 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-671 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-671 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-671 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-671 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-671 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-671 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-671 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-671 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-671 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-671 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-671 | Swift | swift/constant-password | Constant password |
CWE-671 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-672 | C/C++ | cpp/double-free | Potential double free |
CWE-672 | C/C++ | cpp/use-after-free | Potential use after free |
CWE-672 | C/C++ | cpp/return-stack-allocated-memory | Returning stack-allocated memory |
CWE-672 | C/C++ | cpp/using-expired-stack-address | Use of expired stack-address |
CWE-672 | C/C++ | cpp/iterator-to-expired-container | Iterator to expired container |
CWE-672 | C/C++ | cpp/use-of-string-after-lifetime-ends | Use of string after lifetime ends |
CWE-672 | C/C++ | cpp/use-of-unique-pointer-after-lifetime-ends | Use of unique pointer after lifetime ends |
CWE-672 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-672 | C/C++ | cpp/use-after-expired-lifetime | Use of object after its lifetime has ended |
CWE-672 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-674 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-674 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-674 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-674 | JavaScript/TypeScript | js/xml-bomb | XML internal entity expansion |
CWE-674 | JavaScript/TypeScript | js/xml-bomb-more-sources | XML internal entity expansion with additional heuristic sources |
CWE-674 | Python | py/xml-bomb | XML internal entity expansion |
CWE-674 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-674 | Ruby | rb/xxe | XML external entity expansion |
CWE-674 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-675 | C/C++ | cpp/double-free | Potential double free |
CWE-675 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-675 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-675 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-675 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-675 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-675 | C/C++ | cpp/double-release | Errors When Double Release |
CWE-675 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-676 | C/C++ | cpp/bad-strncpy-size | Possibly wrong buffer size in string copy |
CWE-676 | C/C++ | cpp/suspicious-call-to-memset | Suspicious call to memset |
CWE-676 | C/C++ | cpp/unsafe-strncat | Potentially unsafe call to strncat |
CWE-676 | C/C++ | cpp/unsafe-strcat | Potentially unsafe use of strcat |
CWE-676 | C/C++ | cpp/dangerous-function-overflow | Use of dangerous function |
CWE-676 | C/C++ | cpp/dangerous-cin | Dangerous use of 'cin' |
CWE-676 | C/C++ | cpp/potentially-dangerous-function | Use of potentially dangerous function |
CWE-676 | Java/Kotlin | java/potentially-dangerous-function | Use of a potentially dangerous function |
CWE-676 | JavaScript/TypeScript | js/eval-like-call | Call to eval-like DOM function |
CWE-676 | JavaScript/TypeScript | js/eval-call | Use of eval |
CWE-681 | C/C++ | cpp/bad-addition-overflow-check | Bad check for overflow of integer addition |
CWE-681 | C/C++ | cpp/integer-multiplication-cast-to-long | Multiplication result converted to larger type |
CWE-681 | C/C++ | cpp/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-681 | C/C++ | cpp/integer-overflow-tainted | Potential integer arithmetic overflow |
CWE-681 | C# | cs/loss-of-precision | Possible loss of precision |
CWE-681 | Go | go/shift-out-of-range | Shift out of range |
CWE-681 | Go | go/incorrect-integer-conversion | Incorrect conversion between integer types |
CWE-681 | Java/Kotlin | java/implicit-cast-in-compound-assignment | Implicit narrowing conversion in compound assignment |
CWE-681 | Java/Kotlin | java/integer-multiplication-cast-to-long | Result of multiplication cast to wider type |
CWE-681 | Java/Kotlin | java/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-681 | Java/Kotlin | java/tainted-numeric-cast | User-controlled data in numeric cast |
CWE-681 | JavaScript/TypeScript | js/shift-out-of-range | Shift out of range |
CWE-682 | C/C++ | cpp/overflow-calculated | Buffer not sufficient for string |
CWE-682 | C/C++ | cpp/overflow-destination | Copy function using source size |
CWE-682 | C/C++ | cpp/static-buffer-overflow | Static array access may cause overflow |
CWE-682 | C/C++ | cpp/allocation-too-small | Not enough memory allocated for pointer type |
CWE-682 | C/C++ | cpp/suspicious-allocation-size | Not enough memory allocated for array of pointer type |
CWE-682 | C/C++ | cpp/ambiguously-signed-bit-field | Ambiguously signed bit-field member |
CWE-682 | C/C++ | cpp/bad-addition-overflow-check | Bad check for overflow of integer addition |
CWE-682 | C/C++ | cpp/integer-multiplication-cast-to-long | Multiplication result converted to larger type |
CWE-682 | C/C++ | cpp/signed-overflow-check | Signed overflow check |
CWE-682 | C/C++ | cpp/overflowing-snprintf | Potentially overflowing call to snprintf |
CWE-682 | C/C++ | cpp/suspicious-sizeof | Suspicious 'sizeof' use |
CWE-682 | C/C++ | cpp/overrun-write | Overrunning write |
CWE-682 | C/C++ | cpp/no-space-for-terminator | No space for zero terminator |
CWE-682 | C/C++ | cpp/tainted-arithmetic | User-controlled data in arithmetic expression |
CWE-682 | C/C++ | cpp/uncontrolled-arithmetic | Uncontrolled data in arithmetic expression |
CWE-682 | C/C++ | cpp/arithmetic-with-extreme-values | Use of extreme values in arithmetic expression |
CWE-682 | C/C++ | cpp/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-682 | C/C++ | cpp/integer-overflow-tainted | Potential integer arithmetic overflow |
CWE-682 | C/C++ | cpp/uncontrolled-allocation-size | Uncontrolled allocation size |
CWE-682 | C/C++ | cpp/unsigned-difference-expression-compared-zero | Unsigned difference expression compared to zero |
CWE-682 | C/C++ | cpp/invalid-pointer-deref | Invalid pointer dereference |
CWE-682 | C/C++ | cpp/suspicious-pointer-scaling | Suspicious pointer scaling |
CWE-682 | C/C++ | cpp/incorrect-pointer-scaling-char | Suspicious pointer scaling to char |
CWE-682 | C/C++ | cpp/suspicious-pointer-scaling-void | Suspicious pointer scaling to void |
CWE-682 | C/C++ | cpp/suspicious-add-sizeof | Suspicious add with sizeof |
CWE-682 | C/C++ | cpp/multiplication-overflow-in-alloc | Multiplication result may overflow and be used in allocation |
CWE-682 | C/C++ | cpp/dangerous-use-of-transformation-after-operation | Dangerous use of transformation after operation. |
CWE-682 | C/C++ | cpp/divide-by-zero-using-return-value | Divide by zero using return value |
CWE-682 | C/C++ | cpp/signed-bit-field | Possible signed bit-field member |
CWE-682 | C# | cs/index-out-of-bounds | Off-by-one comparison against container length |
CWE-682 | C# | cs/loss-of-precision | Possible loss of precision |
CWE-682 | Go | go/index-out-of-bounds | Off-by-one comparison against length |
CWE-682 | Go | go/allocation-size-overflow | Size computation for allocation may overflow |
CWE-682 | Go | go/incorrect-integer-conversion | Incorrect conversion between integer types |
CWE-682 | Go | go/divide-by-zero | Divide by zero |
CWE-682 | Java/Kotlin | java/implicit-cast-in-compound-assignment | Implicit narrowing conversion in compound assignment |
CWE-682 | Java/Kotlin | java/integer-multiplication-cast-to-long | Result of multiplication cast to wider type |
CWE-682 | Java/Kotlin | java/index-out-of-bounds | Array index out of bounds |
CWE-682 | Java/Kotlin | java/tainted-arithmetic | User-controlled data in arithmetic expression |
CWE-682 | Java/Kotlin | java/uncontrolled-arithmetic | Uncontrolled data in arithmetic expression |
CWE-682 | Java/Kotlin | java/extreme-value-arithmetic | Use of extreme values in arithmetic expression |
CWE-682 | Java/Kotlin | java/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-682 | JavaScript/TypeScript | js/index-out-of-bounds | Off-by-one comparison against length |
CWE-682 | Swift | swift/string-length-conflation | String length conflation |
CWE-684 | C# | cs/web/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-684 | JavaScript/TypeScript | js/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-685 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-685 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-685 | Java/Kotlin | java/missing-format-argument | Missing format argument |
CWE-685 | Java/Kotlin | java/unused-format-argument | Unused format argument |
CWE-685 | JavaScript/TypeScript | js/superfluous-trailing-arguments | Superfluous trailing arguments |
CWE-685 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-685 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-685 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-686 | C/C++ | cpp/wrong-type-format-argument | Wrong type of arguments to formatting function |
CWE-687 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-687 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-691 | C/C++ | cpp/comma-before-misleading-indentation | Comma before misleading indentation |
CWE-691 | C/C++ | cpp/assign-where-compare-meant | Assignment where comparison was intended |
CWE-691 | C/C++ | cpp/compare-where-assign-meant | Comparison where assignment was intended |
CWE-691 | C/C++ | cpp/incorrect-not-operator-usage | Incorrect 'not' operator usage |
CWE-691 | C/C++ | cpp/logical-operator-applied-to-flag | Short-circuiting operator applied to flag |
CWE-691 | C/C++ | cpp/inconsistent-loop-direction | Inconsistent direction of for loop |
CWE-691 | C/C++ | cpp/unsafe-use-of-this | Unsafe use of this in constructor |
CWE-691 | C/C++ | cpp/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-691 | C/C++ | cpp/toctou-race-condition | Time-of-check time-of-use filesystem race condition |
CWE-691 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-691 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-691 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-691 | C/C++ | cpp/infinite-loop-with-unsatisfiable-exit-condition | Infinite loop with unsatisfiable exit condition |
CWE-691 | C/C++ | cpp/linux-kernel-double-fetch-vulnerability | Linux kernel double-fetch vulnerability detection |
CWE-691 | C/C++ | cpp/operator-find-incorrectly-used-switch | Incorrect switch statement |
CWE-691 | C/C++ | cpp/dangerous-use-of-ssl-shutdown | Dangerous use SSL_shutdown. |
CWE-691 | C/C++ | cpp/errors-after-refactoring | Errors After Refactoring |
CWE-691 | C/C++ | cpp/errors-when-using-bit-operations | Errors When Using Bit Operations |
CWE-691 | C/C++ | cpp/operator-find-incorrectly-used-exceptions | Operator Find Incorrectly Used Exceptions |
CWE-691 | C/C++ | cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations | Operator Precedence Logic Error When Use Bitwise Or Logical Operations |
CWE-691 | C/C++ | cpp/operator-precedence-logic-error-when-use-bool-type | Operator Precedence Logic Error When Use Bool Type |
CWE-691 | C# | cs/catch-nullreferenceexception | Poor error handling: catch of NullReferenceException |
CWE-691 | C# | cs/constant-condition | Constant condition |
CWE-691 | C# | cs/unsafe-sync-on-field | Futile synchronization on field |
CWE-691 | C# | cs/inconsistent-lock-sequence | Inconsistent lock sequence |
CWE-691 | C# | cs/lock-this | Locking the 'this' object in a lock statement |
CWE-691 | C# | cs/locked-wait | A lock is held during a wait |
CWE-691 | C# | cs/unsynchronized-getter | Inconsistently synchronized property |
CWE-691 | C# | cs/unsafe-double-checked-lock | Double-checked lock is not thread-safe |
CWE-691 | C# | cs/unsynchronized-static-access | Unsynchronized access to static collection member in non-static context |
CWE-691 | C# | cs/catch-of-all-exceptions | Generic catch clause |
CWE-691 | C# | cs/non-short-circuit | Potentially dangerous use of non-short-circuit logic |
CWE-691 | C# | cs/thread-unsafe-icryptotransform-field-in-class | Thread-unsafe use of a static ICryptoTransform field |
CWE-691 | C# | cs/thread-unsafe-icryptotransform-captured-in-lambda | Thread-unsafe capturing of an ICryptoTransform object |
CWE-691 | C# | cs/linq/inconsistent-enumeration | Bad multiple iteration |
CWE-691 | C# | cs/code-injection | Improper control of generation of code |
CWE-691 | C# | cs/web/missing-global-error-handler | Missing global error handler |
CWE-691 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-691 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-691 | Go | go/inconsistent-loop-direction | Inconsistent direction of for loop |
CWE-691 | Go | go/whitespace-contradicts-precedence | Whitespace contradicts operator precedence |
CWE-691 | Go | go/useless-expression | Expression has no effect |
CWE-691 | Go | go/redundant-operation | Identical operands |
CWE-691 | Go | go/redundant-assignment | Self assignment |
CWE-691 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-691 | Java/Kotlin | java/ejb/container-interference | EJB interferes with container operation |
CWE-691 | Java/Kotlin | java/ejb/synchronization | EJB uses synchronization |
CWE-691 | Java/Kotlin | java/whitespace-contradicts-precedence | Whitespace contradicts operator precedence |
CWE-691 | Java/Kotlin | java/assignment-in-boolean-expression | Assignment in Boolean expression |
CWE-691 | Java/Kotlin | java/reference-equality-on-strings | Reference equality test on strings |
CWE-691 | Java/Kotlin | java/wait-on-condition-interface | Wait on condition |
CWE-691 | Java/Kotlin | java/call-to-thread-run | Direct call to a run() method |
CWE-691 | Java/Kotlin | java/unsafe-double-checked-locking | Double-checked locking is not thread-safe |
CWE-691 | Java/Kotlin | java/unsafe-double-checked-locking-init-order | Race condition in double-checked locking object initialization |
CWE-691 | Java/Kotlin | java/unsafe-sync-on-field | Futile synchronization on field |
CWE-691 | Java/Kotlin | java/inconsistent-field-synchronization | Inconsistent synchronization for field |
CWE-691 | Java/Kotlin | java/lazy-initialization | Incorrect lazy initialization of a static field |
CWE-691 | Java/Kotlin | java/non-sync-override | Non-synchronized override of synchronized method |
CWE-691 | Java/Kotlin | java/notify-instead-of-notify-all | notify instead of notifyAll |
CWE-691 | Java/Kotlin | java/sleep-with-lock-held | Sleep with lock held |
CWE-691 | Java/Kotlin | java/sync-on-boxed-types | Synchronization on boxed types or strings |
CWE-691 | Java/Kotlin | java/unsynchronized-getter | Inconsistent synchronization of getter and setter |
CWE-691 | Java/Kotlin | java/inconsistent-sync-writeobject | Inconsistent synchronization for writeObject() |
CWE-691 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-691 | Java/Kotlin | java/wait-with-two-locks | Wait with two locks held |
CWE-691 | Java/Kotlin | java/non-short-circuit-evaluation | Dangerous non-short-circuit logic |
CWE-691 | Java/Kotlin | java/constant-loop-condition | Constant loop condition |
CWE-691 | Java/Kotlin | java/android/arbitrary-apk-installation | Android APK installation |
CWE-691 | Java/Kotlin | java/groovy-injection | Groovy Language injection |
CWE-691 | Java/Kotlin | java/insecure-bean-validation | Insecure Bean Validation |
CWE-691 | Java/Kotlin | java/jexl-expression-injection | Expression language injection (JEXL) |
CWE-691 | Java/Kotlin | java/mvel-expression-injection | Expression language injection (MVEL) |
CWE-691 | Java/Kotlin | java/spel-expression-injection | Expression language injection (Spring) |
CWE-691 | Java/Kotlin | java/server-side-template-injection | Server-side template injection |
CWE-691 | Java/Kotlin | java/toctou-race-condition | Time-of-check time-of-use race condition |
CWE-691 | Java/Kotlin | java/socket-auth-race-condition | Race condition in socket authentication |
CWE-691 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-691 | Java/Kotlin | java/android/unsafe-android-webview-fetch | Unsafe resource fetching in Android WebView |
CWE-691 | Java/Kotlin | java/lock-order-inconsistency | Lock order inconsistency |
CWE-691 | Java/Kotlin | java/unreachable-exit-in-loop | Loop with unreachable exit condition |
CWE-691 | Java/Kotlin | java/switch-fall-through | Unterminated switch case |
CWE-691 | Java/Kotlin | java/overly-general-catch | Overly-general catch clause |
CWE-691 | Java/Kotlin | java/uncaught-number-format-exception | Missing catch of NumberFormatException |
CWE-691 | Java/Kotlin | java/jvm-exit | Forcible JVM termination |
CWE-691 | Java/Kotlin | java/abnormal-finally-completion | Finally block may not complete normally |
CWE-691 | Java/Kotlin | java/beanshell-injection | BeanShell injection |
CWE-691 | Java/Kotlin | java/android-insecure-dex-loading | Insecure loading of an Android Dex File |
CWE-691 | Java/Kotlin | java/jshell-injection | JShell injection |
CWE-691 | Java/Kotlin | java/javaee-expression-injection | Jakarta Expression Language injection |
CWE-691 | Java/Kotlin | java/jython-injection | Injection in Jython |
CWE-691 | Java/Kotlin | java/unsafe-eval | Injection in Java Script Engine |
CWE-691 | Java/Kotlin | java/spring-view-manipulation-implicit | Spring Implicit View Manipulation |
CWE-691 | Java/Kotlin | java/spring-view-manipulation | Spring View Manipulation |
CWE-691 | Java/Kotlin | java/uncaught-servlet-exception | Uncaught Servlet Exception |
CWE-691 | JavaScript/TypeScript | js/enabling-electron-renderer-node-integration | Enabling Node.js integration for Electron web content renderers |
CWE-691 | JavaScript/TypeScript | js/useless-expression | Expression has no effect |
CWE-691 | JavaScript/TypeScript | js/redundant-operation | Identical operands |
CWE-691 | JavaScript/TypeScript | js/redundant-assignment | Self assignment |
CWE-691 | JavaScript/TypeScript | js/unclear-operator-precedence | Unclear precedence of nested operators |
CWE-691 | JavaScript/TypeScript | js/whitespace-contradicts-precedence | Whitespace contradicts operator precedence |
CWE-691 | JavaScript/TypeScript | js/deletion-of-non-property | Deleting non-property |
CWE-691 | JavaScript/TypeScript | js/exit-from-finally | Jump from finally |
CWE-691 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-691 | JavaScript/TypeScript | js/code-injection | Code injection |
CWE-691 | JavaScript/TypeScript | js/actions/command-injection | Expression injection in Actions |
CWE-691 | JavaScript/TypeScript | js/bad-code-sanitization | Improper code sanitization |
CWE-691 | JavaScript/TypeScript | js/unsafe-code-construction | Unsafe code constructed from library input |
CWE-691 | JavaScript/TypeScript | js/unsafe-dynamic-method-access | Unsafe dynamic method access |
CWE-691 | JavaScript/TypeScript | js/file-system-race | Potential file system race condition |
CWE-691 | JavaScript/TypeScript | js/server-crash | Server crash |
CWE-691 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-691 | JavaScript/TypeScript | js/xml-bomb | XML internal entity expansion |
CWE-691 | JavaScript/TypeScript | js/loop-bound-injection | Loop bound injection |
CWE-691 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-691 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-691 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-691 | JavaScript/TypeScript | js/misleading-indentation-of-dangling-else | Misleading indentation of dangling 'else' |
CWE-691 | JavaScript/TypeScript | js/inconsistent-loop-direction | Inconsistent direction of for loop |
CWE-691 | JavaScript/TypeScript | js/misleading-indentation-after-control-statement | Misleading indentation after control statement |
CWE-691 | JavaScript/TypeScript | js/code-injection-dynamic-import | Code injection |
CWE-691 | JavaScript/TypeScript | js/actions/pull-request-target | Checkout of untrusted code in trusted context |
CWE-691 | JavaScript/TypeScript | js/code-injection-more-sources | Code injection with additional heuristic sources |
CWE-691 | JavaScript/TypeScript | js/xml-bomb-more-sources | XML internal entity expansion with additional heuristic sources |
CWE-691 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-691 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-691 | Python | py/code-injection | Code injection |
CWE-691 | Python | py/xml-bomb | XML internal entity expansion |
CWE-691 | Python | py/asserts-tuple | Asserting a tuple |
CWE-691 | Python | py/exit-from-finally | 'break' or 'return' statement in finally |
CWE-691 | Python | py/js2py-rce | JavaScript code execution. |
CWE-691 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-691 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-691 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-691 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-691 | Ruby | rb/code-injection | Code injection |
CWE-691 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-691 | Ruby | rb/xxe | XML external entity expansion |
CWE-691 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-691 | Swift | swift/unsafe-js-eval | JavaScript Injection |
CWE-691 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-693 | C/C++ | cpp/boost/tls-settings-misconfiguration | boost::asio TLS settings misconfiguration |
CWE-693 | C/C++ | cpp/boost/use-of-deprecated-hardcoded-security-protocol | boost::asio use of deprecated hardcoded protocol |
CWE-693 | C/C++ | cpp/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-693 | C/C++ | cpp/count-untrusted-data-external-api-ir | Frequency counts for external APIs that are used with untrusted data |
CWE-693 | C/C++ | cpp/untrusted-data-to-external-api-ir | Untrusted data passed to external API |
CWE-693 | C/C++ | cpp/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-693 | C/C++ | cpp/uncontrolled-process-operation | Uncontrolled process operation |
CWE-693 | C/C++ | cpp/unclear-array-index-validation | Unclear validation of array index |
CWE-693 | C/C++ | cpp/uncontrolled-allocation-size | Uncontrolled allocation size |
CWE-693 | C/C++ | cpp/user-controlled-bypass | Authentication bypass by spoofing |
CWE-693 | C/C++ | cpp/certificate-result-conflation | Certificate result conflation |
CWE-693 | C/C++ | cpp/certificate-not-checked | Certificate not checked |
CWE-693 | C/C++ | cpp/cleartext-storage-buffer | Cleartext storage of sensitive information in buffer |
CWE-693 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-693 | C/C++ | cpp/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-693 | C/C++ | cpp/cleartext-storage-database | Cleartext storage of sensitive information in an SQLite database |
CWE-693 | C/C++ | cpp/non-https-url | Failure to use HTTPS URLs |
CWE-693 | C/C++ | cpp/insufficient-key-size | Use of a cryptographic algorithm with insufficient key size |
CWE-693 | C/C++ | cpp/weak-cryptographic-algorithm | Use of a broken or risky cryptographic algorithm |
CWE-693 | C/C++ | cpp/openssl-heartbleed | Use of a version of OpenSSL with Heartbleed |
CWE-693 | C/C++ | cpp/world-writable-file-creation | File created without restricting permissions |
CWE-693 | C/C++ | cpp/open-call-with-mode-argument | File opened with O_CREAT flag but without mode argument |
CWE-693 | C/C++ | cpp/unsafe-dacl-security-descriptor | Setting a DACL to NULL in a SECURITY_DESCRIPTOR |
CWE-693 | C/C++ | cpp/tainted-permissions-check | Untrusted input for a condition |
CWE-693 | C/C++ | cpp/late-check-of-function-argument | Late Check Of Function Argument |
CWE-693 | C/C++ | cpp/linux-kernel-no-check-before-unsafe-put-user | Linux kernel no check before unsafe_put_user vulnerability detection |
CWE-693 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-693 | C/C++ | cpp/drop-linux-privileges-outoforder | LinuxPrivilegeDroppingOutoforder |
CWE-693 | C/C++ | cpp/pam-auth-bypass | PAM Authorization bypass |
CWE-693 | C/C++ | cpp/curl-disabled-ssl | Disabled certifcate verification |
CWE-693 | C/C++ | cpp/unknown-asymmetric-key-gen-size | Unknown key generation key size |
CWE-693 | C/C++ | cpp/weak-asymmetric-key-gen-size | Weak asymmetric key generation key size (< 2048 bits) |
CWE-693 | C/C++ | cpp/weak-block-mode | Weak block mode |
CWE-693 | C/C++ | cpp/weak-elliptic-curve | Weak elliptic curve |
CWE-693 | C/C++ | cpp/weak-crypto/banned-encryption-algorithms | Weak cryptography |
CWE-693 | C/C++ | cpp/weak-crypto/banned-hash-algorithms | Weak cryptography |
CWE-693 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-693 | C# | cs/password-in-configuration | Password in configuration file |
CWE-693 | C# | cs/web/ambiguous-client-variable | Value shadowing |
CWE-693 | C# | cs/web/ambiguous-server-variable | Value shadowing: server variable |
CWE-693 | C# | cs/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-693 | C# | cs/serialization-check-bypass | Serialization check bypass |
CWE-693 | C# | cs/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-693 | C# | cs/xml/missing-validation | Missing XML validation |
CWE-693 | C# | cs/assembly-path-injection | Assembly path injection |
CWE-693 | C# | cs/web/missing-function-level-access-control | Missing function level access control |
CWE-693 | C# | cs/cleartext-storage-of-sensitive-information | Clear text storage of sensitive information |
CWE-693 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-693 | C# | cs/adding-cert-to-root-store | Do not add certificates to the system root store. |
CWE-693 | C# | cs/insecure-sql-connection | Insecure SQL connection |
CWE-693 | C# | cs/web/missing-token-validation | Missing cross-site request forgery token validation |
CWE-693 | C# | cs/session-reuse | Failure to abandon session |
CWE-693 | C# | cs/web/requiressl-not-set | 'requireSSL' attribute is not set to true |
CWE-693 | C# | cs/web/insecure-direct-object-reference | Insecure Direct Object Reference |
CWE-693 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-693 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-693 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-693 | C# | cs/web/broad-cookie-domain | Cookie security: overly broad domain |
CWE-693 | C# | cs/web/broad-cookie-path | Cookie security: overly broad path |
CWE-693 | C# | cs/ecb-encryption | Encryption using ECB |
CWE-693 | C# | cs/inadequate-rsa-padding | Weak encryption: inadequate RSA padding |
CWE-693 | C# | cs/insufficient-key-size | Weak encryption: Insufficient key size |
CWE-693 | C# | cs/weak-encryption | Weak encryption |
CWE-693 | C# | cs/azure-storage/unsafe-usage-of-client-side-encryption-version | Unsafe usage of v1 version of Azure Storage client-side encryption (CVE-2022-30187). |
CWE-693 | C# | cs/web/cookie-secure-not-set | 'Secure' attribute is not set to true |
CWE-693 | C# | cs/hash-without-salt | Use of a hash function without a salt |
CWE-693 | Go | go/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-693 | Go | go/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-693 | Go | go/incomplete-url-scheme-check | Incomplete URL scheme check |
CWE-693 | Go | go/regex/missing-regexp-anchor | Missing regular expression anchor |
CWE-693 | Go | go/suspicious-character-in-regex | Suspicious characters in a regular expression |
CWE-693 | Go | go/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-693 | Go | go/untrusted-data-to-unknown-external-api | Untrusted data passed to unknown external API |
CWE-693 | Go | go/disabled-certificate-check | Disabled TLS certificate check |
CWE-693 | Go | go/clear-text-logging | Clear-text logging of sensitive information |
CWE-693 | Go | go/insecure-hostkeycallback | Use of insecure HostKeyCallback implementation |
CWE-693 | Go | go/weak-crypto-key | Use of a weak cryptographic key |
CWE-693 | Go | go/insecure-tls | Insecure TLS configuration |
CWE-693 | Go | go/missing-jwt-signature-check | Missing JWT signature check |
CWE-693 | Go | go/constant-oauth2-state | Use of constant state value in OAuth 2.0 URL |
CWE-693 | Go | go/email-injection | Email content injection |
CWE-693 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-693 | Go | go/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-693 | Go | go/improper-ldap-auth | Improper LDAP Authentication |
CWE-693 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-693 | Go | go/weak-crypto-algorithm | Use of a weak cryptographic algorithm |
CWE-693 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-693 | Go | go/cors-misconfiguration | CORS misconfiguration |
CWE-693 | Java/Kotlin | java/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-693 | Java/Kotlin | java/overly-large-range | Overly permissive regular expression range |
CWE-693 | Java/Kotlin | java/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-693 | Java/Kotlin | java/improper-validation-of-array-construction | Improper validation of user-provided size used for array construction |
CWE-693 | Java/Kotlin | java/improper-validation-of-array-construction-code-specified | Improper validation of code-specified size used for array construction |
CWE-693 | Java/Kotlin | java/improper-validation-of-array-index | Improper validation of user-provided array index |
CWE-693 | Java/Kotlin | java/improper-validation-of-array-index-code-specified | Improper validation of code-specified array index |
CWE-693 | Java/Kotlin | java/local-temp-file-or-directory-information-disclosure | Local information disclosure in a temporary directory |
CWE-693 | Java/Kotlin | java/android/intent-uri-permission-manipulation | Intent URI permission manipulation |
CWE-693 | Java/Kotlin | java/unsafe-cert-trust | Unsafe certificate trust |
CWE-693 | Java/Kotlin | java/android/insecure-local-key-gen | Insecurely generated keys for local authentication |
CWE-693 | Java/Kotlin | java/android/insecure-local-authentication | Insecure local authentication |
CWE-693 | Java/Kotlin | java/android/missing-certificate-pinning | Android missing certificate pinning |
CWE-693 | Java/Kotlin | java/improper-webview-certificate-validation | Android WebView that accepts all certificates |
CWE-693 | Java/Kotlin | java/insecure-trustmanager | TrustManager that accepts all certificates |
CWE-693 | Java/Kotlin | java/insecure-smtp-ssl | Insecure JavaMail SSL Configuration |
CWE-693 | Java/Kotlin | java/unsafe-hostname-verification | Unsafe hostname verification |
CWE-693 | Java/Kotlin | java/android/backup-enabled | Application backup allowed |
CWE-693 | Java/Kotlin | java/android/cleartext-storage-database | Cleartext storage of sensitive information using a local database on Android |
CWE-693 | Java/Kotlin | java/android/cleartext-storage-filesystem | Cleartext storage of sensitive information in the Android filesystem |
CWE-693 | Java/Kotlin | java/cleartext-storage-in-class | Cleartext storage of sensitive information using storable class |
CWE-693 | Java/Kotlin | java/cleartext-storage-in-cookie | Cleartext storage of sensitive information in cookie |
CWE-693 | Java/Kotlin | java/cleartext-storage-in-properties | Cleartext storage of sensitive information using 'Properties' class |
CWE-693 | Java/Kotlin | java/android/cleartext-storage-shared-prefs | Cleartext storage of sensitive information using SharedPreferences on Android |
CWE-693 | Java/Kotlin | java/non-https-url | Failure to use HTTPS URLs |
CWE-693 | Java/Kotlin | java/non-ssl-connection | Failure to use SSL |
CWE-693 | Java/Kotlin | java/non-ssl-socket-factory | Failure to use SSL socket factories |
CWE-693 | Java/Kotlin | java/insufficient-key-size | Use of a cryptographic algorithm with insufficient key size |
CWE-693 | Java/Kotlin | java/weak-cryptographic-algorithm | Use of a broken or risky cryptographic algorithm |
CWE-693 | Java/Kotlin | java/potentially-weak-cryptographic-algorithm | Use of a potentially broken or risky cryptographic algorithm |
CWE-693 | Java/Kotlin | java/missing-jwt-signature-check | Missing JWT signature check |
CWE-693 | Java/Kotlin | java/spring-disabled-csrf-protection | Disabled Spring CSRF protection |
CWE-693 | Java/Kotlin | java/socket-auth-race-condition | Race condition in socket authentication |
CWE-693 | Java/Kotlin | java/insecure-basic-auth | Insecure basic authentication |
CWE-693 | Java/Kotlin | java/insecure-ldap-auth | Insecure LDAP authentication |
CWE-693 | Java/Kotlin | java/insecure-cookie | Failure to use secure cookies |
CWE-693 | Java/Kotlin | java/world-writable-file-read | Reading from a world writable file |
CWE-693 | Java/Kotlin | java/rsa-without-oaep | Use of RSA algorithm without OAEP |
CWE-693 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-693 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-693 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-693 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-693 | Java/Kotlin | java/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-693 | Java/Kotlin | java/tainted-permissions-check | User-controlled data used in permissions check |
CWE-693 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-693 | Java/Kotlin | java/improper-intent-verification | Improper verification of intent by broadcast receiver |
CWE-693 | Java/Kotlin | java/android/incomplete-provider-permissions | Missing read or write permission in a content provider |
CWE-693 | Java/Kotlin | java/android/implicitly-exported-component | Implicitly exported Android component |
CWE-693 | Java/Kotlin | java/android/implicit-pendingintents | Use of implicit PendingIntents |
CWE-693 | Java/Kotlin | java/android/sensitive-communication | Leaking sensitive information through an implicit Intent |
CWE-693 | Java/Kotlin | java/android/sensitive-result-receiver | Leaking sensitive information through a ResultReceiver |
CWE-693 | Java/Kotlin | java/android/intent-redirection | Android Intent redirection |
CWE-693 | Java/Kotlin | java/log4j-injection | Potential Log4J LDAP JNDI injection (CVE-2021-44228) |
CWE-693 | Java/Kotlin | java/jxbrowser/disabled-certificate-validation | JxBrowser with disabled certificate validation |
CWE-693 | Java/Kotlin | java/ignored-hostname-verification | Ignored result of hostname verification |
CWE-693 | Java/Kotlin | java/insecure-ldaps-endpoint | Insecure LDAPS Endpoint Configuration |
CWE-693 | Java/Kotlin | java/disabled-certificate-revocation-checking | Disabled certificate revocation checking |
CWE-693 | Java/Kotlin | java/azure-storage/unsafe-client-side-encryption-in-use | Unsafe usage of v1 version of Azure Storage client-side encryption (CVE-2022-30187). |
CWE-693 | Java/Kotlin | java/unsafe-tls-version | Unsafe TLS version |
CWE-693 | Java/Kotlin | java/unvalidated-cors-origin-set | CORS is derived from untrusted input |
CWE-693 | Java/Kotlin | java/missing-jwt-signature-check-auth0 | Missing JWT signature check |
CWE-693 | Java/Kotlin | java/ip-address-spoofing | IP address spoofing |
CWE-693 | Java/Kotlin | java/jsonp-injection | JSONP Injection |
CWE-693 | Java/Kotlin | java/credentials-in-properties | Cleartext Credentials in Properties File |
CWE-693 | Java/Kotlin | java/password-in-configuration | Password in configuration file |
CWE-693 | Java/Kotlin | java/permissive-dot-regex | URL matched by permissive . in a regular expression |
CWE-693 | Java/Kotlin | java/hash-without-salt | Use of a hash function without a salt |
CWE-693 | Java/Kotlin | java/incorrect-url-verification | Incorrect URL verification |
CWE-693 | JavaScript/TypeScript | js/angular/insecure-url-whitelist | Insecure URL whitelist |
CWE-693 | JavaScript/TypeScript | js/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-693 | JavaScript/TypeScript | js/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-693 | JavaScript/TypeScript | js/incomplete-url-scheme-check | Incomplete URL scheme check |
CWE-693 | JavaScript/TypeScript | js/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-693 | JavaScript/TypeScript | js/incorrect-suffix-check | Incorrect suffix check |
CWE-693 | JavaScript/TypeScript | js/missing-origin-check | Missing origin verification in postMessage handler |
CWE-693 | JavaScript/TypeScript | js/regex/missing-regexp-anchor | Missing regular expression anchor |
CWE-693 | JavaScript/TypeScript | js/overly-large-range | Overly permissive regular expression range |
CWE-693 | JavaScript/TypeScript | js/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-693 | JavaScript/TypeScript | js/useless-regexp-character-escape | Useless regular-expression character escape |
CWE-693 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-693 | JavaScript/TypeScript | js/double-escaping | Double escaping or unescaping |
CWE-693 | JavaScript/TypeScript | js/incomplete-html-attribute-sanitization | Incomplete HTML attribute sanitization |
CWE-693 | JavaScript/TypeScript | js/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-693 | JavaScript/TypeScript | js/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-693 | JavaScript/TypeScript | js/exposure-of-private-files | Exposure of private files |
CWE-693 | JavaScript/TypeScript | js/disabling-certificate-validation | Disabling certificate validation |
CWE-693 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-693 | JavaScript/TypeScript | js/actions/actions-artifact-leak | Storage of sensitive information in GitHub Actions artifact |
CWE-693 | JavaScript/TypeScript | js/build-artifact-leak | Storage of sensitive information in build artifact |
CWE-693 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-693 | JavaScript/TypeScript | js/clear-text-storage-of-sensitive-data | Clear text storage of sensitive information |
CWE-693 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-693 | JavaScript/TypeScript | js/insufficient-key-size | Use of a weak cryptographic key |
CWE-693 | JavaScript/TypeScript | js/biased-cryptographic-random | Creating biased random numbers from a cryptographically secure source |
CWE-693 | JavaScript/TypeScript | js/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-693 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-693 | JavaScript/TypeScript | js/jwt-missing-verification | JWT missing secret or public key verification |
CWE-693 | JavaScript/TypeScript | js/missing-token-validation | Missing CSRF middleware |
CWE-693 | JavaScript/TypeScript | js/session-fixation | Failure to abandon session |
CWE-693 | JavaScript/TypeScript | js/remote-property-injection | Remote property injection |
CWE-693 | JavaScript/TypeScript | js/clear-text-cookie | Clear text transmission of sensitive cookie |
CWE-693 | JavaScript/TypeScript | js/host-header-forgery-in-email-generation | Host header poisoning in email generation |
CWE-693 | JavaScript/TypeScript | js/insecure-helmet-configuration | Insecure configuration of Helmet security middleware |
CWE-693 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-693 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-693 | JavaScript/TypeScript | js/user-controlled-bypass | User-controlled bypass of security check |
CWE-693 | JavaScript/TypeScript | js/different-kinds-comparison-bypass | Comparison of user-controlled data of different kinds |
CWE-693 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-693 | JavaScript/TypeScript | js/insufficient-password-hash | Use of password hash with insufficient computational effort |
CWE-693 | JavaScript/TypeScript | js/decode-jwt-without-verification | JWT missing secret or public key verification |
CWE-693 | JavaScript/TypeScript | js/decode-jwt-without-verification-local-source | JWT missing secret or public key verification |
CWE-693 | JavaScript/TypeScript | js/user-controlled-data-decompression | User-controlled file decompression |
CWE-693 | JavaScript/TypeScript | js/cors-misconfiguration | overly CORS configuration |
CWE-693 | JavaScript/TypeScript | js/untrusted-data-to-external-api-more-sources | Untrusted data passed to external API with additional heuristic sources |
CWE-693 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-693 | JavaScript/TypeScript | js/remote-property-injection-more-sources | Remote property injection with additional heuristic sources |
CWE-693 | JavaScript/TypeScript | js/user-controlled-bypass-more-sources | User-controlled bypass of security check with additional heuristic sources |
CWE-693 | Python | py/count-untrusted-data-external-api | Frequency counts for external APIs that are used with untrusted data |
CWE-693 | Python | py/untrusted-data-to-external-api | Untrusted data passed to external API |
CWE-693 | Python | py/cookie-injection | Construction of a cookie using user-supplied input |
CWE-693 | Python | py/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-693 | Python | py/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-693 | Python | py/overly-large-range | Overly permissive regular expression range |
CWE-693 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-693 | Python | py/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-693 | Python | py/paramiko-missing-host-key-validation | Accepting unknown SSH host keys when using Paramiko |
CWE-693 | Python | py/request-without-cert-validation | Request without certificate validation |
CWE-693 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-693 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-693 | Python | py/weak-crypto-key | Use of weak cryptographic key |
CWE-693 | Python | py/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-693 | Python | py/insecure-default-protocol | Default version of SSL/TLS may be insecure |
CWE-693 | Python | py/insecure-protocol | Use of insecure SSL/TLS version |
CWE-693 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-693 | Python | py/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-693 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-693 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-693 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-693 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-693 | Python | py/flask-constant-secret-key | Initializing SECRET_KEY of Flask application with Constant value |
CWE-693 | Python | py/improper-ldap-auth | Improper LDAP Authentication |
CWE-693 | Python | py/azure-storage/unsafe-client-side-encryption-in-use | Unsafe usage of v1 version of Azure Storage client-side encryption. |
CWE-693 | Python | py/jwt-missing-verification | JWT missing secret or public key verification |
CWE-693 | Python | py/ip-address-spoofing | IP address spoofing |
CWE-693 | Python | py/insecure-ldap-auth | Python Insecure LDAP Authentication |
CWE-693 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-693 | Python | py/unknown-asymmetric-key-gen-size | Unknown key generation key size |
CWE-693 | Python | py/weak-asymmetric-key-gen-size | Weak key generation key size (< 2048 bits) |
CWE-693 | Python | py/weak-block-mode | Weak block mode |
CWE-693 | Python | py/weak-elliptic-curve | Weak elliptic curve |
CWE-693 | Python | py/weak-hashes | Weak hashes |
CWE-693 | Python | py/weak-symmetric-encryption | Weak symmetric encryption algorithm |
CWE-693 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-693 | Ruby | rb/jwt-missing-verification | JWT missing secret or public key verification |
CWE-693 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-693 | Ruby | rb/improper-ldap-auth | Improper LDAP Authentication |
CWE-693 | Ruby | rb/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-693 | Ruby | rb/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-693 | Ruby | rb/regex/badly-anchored-regexp | Badly anchored regular expression |
CWE-693 | Ruby | rb/regex/missing-regexp-anchor | Missing regular expression anchor |
CWE-693 | Ruby | rb/overly-large-range | Overly permissive regular expression range |
CWE-693 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-693 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-693 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-693 | Ruby | rb/request-without-cert-validation | Request without certificate validation |
CWE-693 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-693 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-693 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-693 | Ruby | rb/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-693 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-693 | Ruby | rb/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-693 | Ruby | rb/csrf-protection-not-enabled | CSRF protection not enabled |
CWE-693 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-693 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-693 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-693 | Swift | swift/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-693 | Swift | swift/missing-regexp-anchor | Missing regular expression anchor |
CWE-693 | Swift | swift/bad-tag-filter | Bad HTML filtering regexp |
CWE-693 | Swift | swift/constant-password | Constant password |
CWE-693 | Swift | swift/cleartext-storage-database | Cleartext storage of sensitive information in a local database |
CWE-693 | Swift | swift/cleartext-transmission | Cleartext transmission of sensitive information |
CWE-693 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-693 | Swift | swift/cleartext-storage-preferences | Cleartext storage of sensitive information in an application preference store |
CWE-693 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-693 | Swift | swift/ecb-encryption | Encryption using ECB |
CWE-693 | Swift | swift/weak-password-hashing | Use of an inappropriate cryptographic hashing algorithm on passwords |
CWE-693 | Swift | swift/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-693 | Swift | swift/insecure-tls | Insecure TLS configuration |
CWE-693 | Swift | swift/constant-salt | Use of constant salts |
CWE-693 | Swift | swift/insufficient-hash-iterations | Insufficient hash iterations |
CWE-695 | Java/Kotlin | java/ejb/file-io | EJB uses file input/output |
CWE-695 | Java/Kotlin | java/ejb/graphics | EJB uses graphics |
CWE-695 | Java/Kotlin | java/ejb/synchronization | EJB uses synchronization |
CWE-695 | Java/Kotlin | java/ejb/threads | EJB uses threads |
CWE-696 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-696 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-697 | C/C++ | cpp/missing-case-in-switch | Missing enum case in switch |
CWE-697 | C/C++ | cpp/operator-find-incorrectly-used-switch | Incorrect switch statement |
CWE-697 | C# | cs/class-name-comparison | Erroneous class compare |
CWE-697 | C# | cs/reference-equality-with-object | Reference equality test on System.Object |
CWE-697 | C# | cs/reference-equality-on-valuetypes | Call to ReferenceEquals(...) on value type expressions |
CWE-697 | Go | go/cors-misconfiguration | CORS misconfiguration |
CWE-697 | Java/Kotlin | java/missing-default-in-switch | Missing default case in switch |
CWE-697 | Java/Kotlin | java/reference-equality-with-object | Reference equality test on java.lang.Object |
CWE-697 | Java/Kotlin | java/reference-equality-of-boxed-types | Reference equality test of boxed types |
CWE-697 | Java/Kotlin | java/reference-equality-on-strings | Reference equality test on strings |
CWE-697 | Java/Kotlin | java/missing-case-in-switch | Missing enum case in switch |
CWE-697 | Java/Kotlin | java/permissive-dot-regex | URL matched by permissive . in a regular expression |
CWE-697 | JavaScript/TypeScript | js/angular/insecure-url-whitelist | Insecure URL whitelist |
CWE-697 | JavaScript/TypeScript | js/incomplete-url-scheme-check | Incomplete URL scheme check |
CWE-697 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-697 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-697 | JavaScript/TypeScript | js/cors-misconfiguration | overly CORS configuration |
CWE-697 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-697 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-697 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-697 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-697 | Swift | swift/bad-tag-filter | Bad HTML filtering regexp |
CWE-703 | C/C++ | cpp/incorrectly-checked-scanf | Incorrect return-value check for a 'scanf'-like function |
CWE-703 | C/C++ | cpp/missing-check-scanf | Missing return-value check for a 'scanf'-like function |
CWE-703 | C/C++ | cpp/return-value-ignored | Return value of a function is ignored |
CWE-703 | C/C++ | cpp/overflowing-snprintf | Potentially overflowing call to snprintf |
CWE-703 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-703 | C/C++ | cpp/inconsistent-call-on-result | Inconsistent operation on return value |
CWE-703 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-703 | C/C++ | cpp/ignore-return-value-sal | SAL requires inspecting return value |
CWE-703 | C/C++ | cpp/hresult-boolean-conversion | Cast between HRESULT and a Boolean type |
CWE-703 | C/C++ | cpp/incorrect-allocation-error-handling | Incorrect allocation-error handling |
CWE-703 | C/C++ | cpp/work-with-changing-working-directories | Find work with changing working directories, with security errors. |
CWE-703 | C/C++ | cpp/drop-linux-privileges-outoforder | LinuxPrivilegeDroppingOutoforder |
CWE-703 | C/C++ | cpp/operator-find-incorrectly-used-exceptions | Operator Find Incorrectly Used Exceptions |
CWE-703 | C/C++ | cpp/improper-check-return-value-scanf | Improper check of return value of scanf |
CWE-703 | C# | cs/dispose-not-called-on-throw | Dispose may not be called if an exception is thrown during execution |
CWE-703 | C# | cs/local-not-disposed | Missing Dispose call on local IDisposable |
CWE-703 | C# | cs/unchecked-return-value | Unchecked return value |
CWE-703 | C# | cs/catch-nullreferenceexception | Poor error handling: catch of NullReferenceException |
CWE-703 | C# | cs/empty-catch-block | Poor error handling: empty catch block |
CWE-703 | C# | cs/catch-of-all-exceptions | Generic catch clause |
CWE-703 | C# | cs/information-exposure-through-exception | Information exposure through an exception |
CWE-703 | C# | cs/web/missing-global-error-handler | Missing global error handler |
CWE-703 | Go | go/stack-trace-exposure | Information exposure through a stack trace |
CWE-703 | Java/Kotlin | java/inconsistent-call-on-result | Inconsistent operation on return value |
CWE-703 | Java/Kotlin | java/return-value-ignored | Method result ignored |
CWE-703 | Java/Kotlin | java/error-message-exposure | Information exposure through an error message |
CWE-703 | Java/Kotlin | java/stack-trace-exposure | Information exposure through a stack trace |
CWE-703 | Java/Kotlin | java/unsafe-cert-trust | Unsafe certificate trust |
CWE-703 | Java/Kotlin | java/discarded-exception | Discarded exception |
CWE-703 | Java/Kotlin | java/overly-general-catch | Overly-general catch clause |
CWE-703 | Java/Kotlin | java/ignored-error-status-of-call | Ignored error status of call |
CWE-703 | Java/Kotlin | java/uncaught-number-format-exception | Missing catch of NumberFormatException |
CWE-703 | Java/Kotlin | java/uncaught-servlet-exception | Uncaught Servlet Exception |
CWE-703 | Java/Kotlin | java/android/nfe-local-android-dos | Local Android DoS Caused By NumberFormatException |
CWE-703 | JavaScript/TypeScript | js/stack-trace-exposure | Information exposure through a stack trace |
CWE-703 | JavaScript/TypeScript | js/server-crash | Server crash |
CWE-703 | JavaScript/TypeScript | js/unvalidated-dynamic-method-call | Unvalidated dynamic method call |
CWE-703 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-703 | Python | py/empty-except | Empty except |
CWE-703 | Python | py/ignored-return-value | Ignored return value |
CWE-703 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-703 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-704 | C/C++ | cpp/bad-addition-overflow-check | Bad check for overflow of integer addition |
CWE-704 | C/C++ | cpp/integer-multiplication-cast-to-long | Multiplication result converted to larger type |
CWE-704 | C/C++ | cpp/upcast-array-pointer-arithmetic | Upcast array used in pointer arithmetic |
CWE-704 | C/C++ | cpp/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-704 | C/C++ | cpp/integer-overflow-tainted | Potential integer arithmetic overflow |
CWE-704 | C/C++ | cpp/incorrect-string-type-conversion | Cast from char to wchar_t |
CWE-704 | C/C++ | cpp/type-confusion | Type confusion |
CWE-704 | C# | cs/loss-of-precision | Possible loss of precision |
CWE-704 | Go | go/shift-out-of-range | Shift out of range |
CWE-704 | Go | go/incorrect-integer-conversion | Incorrect conversion between integer types |
CWE-704 | Java/Kotlin | java/implicit-cast-in-compound-assignment | Implicit narrowing conversion in compound assignment |
CWE-704 | Java/Kotlin | java/integer-multiplication-cast-to-long | Result of multiplication cast to wider type |
CWE-704 | Java/Kotlin | java/impossible-array-cast | Impossible array cast |
CWE-704 | Java/Kotlin | java/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-704 | Java/Kotlin | java/tainted-numeric-cast | User-controlled data in numeric cast |
CWE-704 | JavaScript/TypeScript | js/implicit-operand-conversion | Implicit operand conversion |
CWE-704 | JavaScript/TypeScript | js/shift-out-of-range | Shift out of range |
CWE-704 | JavaScript/TypeScript | js/invalid-prototype-value | Invalid prototype value |
CWE-704 | JavaScript/TypeScript | js/property-assignment-on-primitive | Assignment to property of primitive value |
CWE-704 | JavaScript/TypeScript | js/type-confusion-through-parameter-tampering | Type confusion through parameter tampering |
CWE-705 | C/C++ | cpp/operator-find-incorrectly-used-exceptions | Operator Find Incorrectly Used Exceptions |
CWE-705 | C# | cs/catch-nullreferenceexception | Poor error handling: catch of NullReferenceException |
CWE-705 | C# | cs/catch-of-all-exceptions | Generic catch clause |
CWE-705 | C# | cs/web/missing-global-error-handler | Missing global error handler |
CWE-705 | Java/Kotlin | java/ejb/container-interference | EJB interferes with container operation |
CWE-705 | Java/Kotlin | java/overly-general-catch | Overly-general catch clause |
CWE-705 | Java/Kotlin | java/uncaught-number-format-exception | Missing catch of NumberFormatException |
CWE-705 | Java/Kotlin | java/jvm-exit | Forcible JVM termination |
CWE-705 | Java/Kotlin | java/abnormal-finally-completion | Finally block may not complete normally |
CWE-705 | Java/Kotlin | java/uncaught-servlet-exception | Uncaught Servlet Exception |
CWE-705 | JavaScript/TypeScript | js/exit-from-finally | Jump from finally |
CWE-705 | JavaScript/TypeScript | js/server-crash | Server crash |
CWE-705 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-705 | Python | py/exit-from-finally | 'break' or 'return' statement in finally |
CWE-706 | C/C++ | cpp/path-injection | Uncontrolled data used in path expression |
CWE-706 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-706 | C# | cs/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-706 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-706 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-706 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-706 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-706 | Go | go/unsafe-unzip-symlink | Arbitrary file write extracting an archive containing symbolic links |
CWE-706 | Go | go/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-706 | Java/Kotlin | java/path-injection | Uncontrolled data used in path expression |
CWE-706 | Java/Kotlin | java/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-706 | Java/Kotlin | java/partial-path-traversal | Partial path traversal vulnerability |
CWE-706 | Java/Kotlin | java/partial-path-traversal-from-remote | Partial path traversal vulnerability from remote |
CWE-706 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-706 | Java/Kotlin | java/openstream-called-on-tainted-url | openStream called on URLs created from remote source |
CWE-706 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-706 | JavaScript/TypeScript | js/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-706 | JavaScript/TypeScript | js/case-sensitive-middleware-path | Case-sensitive middleware path |
CWE-706 | JavaScript/TypeScript | js/xxe | XML external entity expansion |
CWE-706 | JavaScript/TypeScript | js/xxe-more-sources | XML external entity expansion with additional heuristic sources |
CWE-706 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-706 | Python | py/tarslip | Arbitrary file write during tarfile extraction |
CWE-706 | Python | py/xxe | XML external entity expansion |
CWE-706 | Python | py/zipslip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-706 | Python | py/tarslip-extended | Arbitrary file write during tarfile extraction |
CWE-706 | Python | py/unsafe-unpacking | Arbitrary file write during a tarball extraction from a user controlled source |
CWE-706 | Ruby | rb/zip-slip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-706 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-706 | Ruby | rb/xxe | XML external entity expansion |
CWE-706 | Swift | swift/unsafe-unpacking | Arbitrary file write during a zip extraction from a user controlled source |
CWE-706 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-706 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-707 | C/C++ | cpp/non-constant-format | Non-constant format string |
CWE-707 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-707 | C/C++ | cpp/improper-null-termination | Potential improper null termination |
CWE-707 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-707 | C/C++ | cpp/command-line-injection | Uncontrolled data used in OS command |
CWE-707 | C/C++ | cpp/cgi-xss | CGI script vulnerable to cross-site scripting |
CWE-707 | C/C++ | cpp/sql-injection | Uncontrolled data in SQL query |
CWE-707 | C/C++ | cpp/tainted-format-string | Uncontrolled format string |
CWE-707 | C/C++ | cpp/user-controlled-null-termination-tainted | User-controlled data may not be null terminated |
CWE-707 | C/C++ | cpp/wordexp-injection | Uncontrolled data used in wordexp command |
CWE-707 | C# | cs/path-injection | Uncontrolled data used in path expression |
CWE-707 | C# | cs/command-line-injection | Uncontrolled command line |
CWE-707 | C# | cs/web/xss | Cross-site scripting |
CWE-707 | C# | cs/sql-injection | SQL query built from user-controlled sources |
CWE-707 | C# | cs/ldap-injection | LDAP query built from user-controlled sources |
CWE-707 | C# | cs/xml-injection | XML injection |
CWE-707 | C# | cs/code-injection | Improper control of generation of code |
CWE-707 | C# | cs/resource-injection | Resource injection |
CWE-707 | C# | cs/log-forging | Log entries created from user input |
CWE-707 | C# | cs/uncontrolled-format-string | Uncontrolled format string |
CWE-707 | C# | cs/xml/xpath-injection | XPath injection |
CWE-707 | C# | cs/inappropriate-encoding | Inappropriate encoding |
CWE-707 | C# | cs/web/disabled-header-checking | Header checking disabled |
CWE-707 | C# | cs/webclient-path-injection | Uncontrolled data used in a WebClient |
CWE-707 | Go | go/path-injection | Uncontrolled data used in path expression |
CWE-707 | Go | go/command-injection | Command built from user-controlled sources |
CWE-707 | Go | go/stored-command | Command built from stored data |
CWE-707 | Go | go/reflected-xss | Reflected cross-site scripting |
CWE-707 | Go | go/stored-xss | Stored cross-site scripting |
CWE-707 | Go | go/sql-injection | Database query built from user-controlled sources |
CWE-707 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-707 | Go | go/log-injection | Log entries created from user input |
CWE-707 | Go | go/xml/xpath-injection | XPath injection |
CWE-707 | Go | go/ldap-injection | LDAP query built from user-controlled sources |
CWE-707 | Go | go/dsn-injection | SQL Data-source URI built from user-controlled sources |
CWE-707 | Go | go/dsn-injection-local | SQL Data-source URI built from local user-controlled sources |
CWE-707 | Go | go/html-template-escaping-passthrough | HTML template escaping passthrough |
CWE-707 | Java/Kotlin | java/jndi-injection | JNDI lookup with user-controlled name |
CWE-707 | Java/Kotlin | java/xslt-injection | XSLT transformation with user-controlled stylesheet |
CWE-707 | Java/Kotlin | java/relative-path-command | Executing a command with a relative path |
CWE-707 | Java/Kotlin | java/command-line-injection | Uncontrolled command line |
CWE-707 | Java/Kotlin | java/exec-tainted-environment | Building a command with an injected environment variable |
CWE-707 | Java/Kotlin | java/concatenated-command-line | Building a command line with string concatenation |
CWE-707 | Java/Kotlin | java/android/webview-addjavascriptinterface | Access Java object methods through JavaScript exposure |
CWE-707 | Java/Kotlin | java/android/websettings-javascript-enabled | Android WebView JavaScript settings |
CWE-707 | Java/Kotlin | java/xss | Cross-site scripting |
CWE-707 | Java/Kotlin | java/concatenated-sql-query | Query built by concatenation with a possibly-untrusted string |
CWE-707 | Java/Kotlin | java/sql-injection | Query built from user-controlled sources |
CWE-707 | Java/Kotlin | java/ldap-injection | LDAP query built from user-controlled sources |
CWE-707 | Java/Kotlin | java/android/arbitrary-apk-installation | Android APK installation |
CWE-707 | Java/Kotlin | java/groovy-injection | Groovy Language injection |
CWE-707 | Java/Kotlin | java/insecure-bean-validation | Insecure Bean Validation |
CWE-707 | Java/Kotlin | java/jexl-expression-injection | Expression language injection (JEXL) |
CWE-707 | Java/Kotlin | java/mvel-expression-injection | Expression language injection (MVEL) |
CWE-707 | Java/Kotlin | java/spel-expression-injection | Expression language injection (Spring) |
CWE-707 | Java/Kotlin | java/server-side-template-injection | Server-side template injection |
CWE-707 | Java/Kotlin | java/netty-http-request-or-response-splitting | Disabled Netty HTTP header validation |
CWE-707 | Java/Kotlin | java/http-response-splitting | HTTP response splitting |
CWE-707 | Java/Kotlin | java/log-injection | Log Injection |
CWE-707 | Java/Kotlin | java/tainted-format-string | Use of externally-controlled format string |
CWE-707 | Java/Kotlin | java/xml/xpath-injection | XPath injection |
CWE-707 | Java/Kotlin | java/android/unsafe-android-webview-fetch | Unsafe resource fetching in Android WebView |
CWE-707 | Java/Kotlin | java/ognl-injection | OGNL Expression Language statement with user-controlled input |
CWE-707 | Java/Kotlin | java/log4j-injection | Potential Log4J LDAP JNDI injection (CVE-2021-44228) |
CWE-707 | Java/Kotlin | java/command-line-injection-extra | Command Injection into Runtime.exec() with dangerous command |
CWE-707 | Java/Kotlin | java/command-line-injection-extra-local | Command Injection into Runtime.exec() with dangerous command |
CWE-707 | Java/Kotlin | java/command-line-injection-experimental | Uncontrolled command line (experimental sinks) |
CWE-707 | Java/Kotlin | java/mybatis-annotation-sql-injection | SQL injection in MyBatis annotation |
CWE-707 | Java/Kotlin | java/mybatis-xml-sql-injection | SQL injection in MyBatis Mapper XML |
CWE-707 | Java/Kotlin | java/beanshell-injection | BeanShell injection |
CWE-707 | Java/Kotlin | java/android-insecure-dex-loading | Insecure loading of an Android Dex File |
CWE-707 | Java/Kotlin | java/jshell-injection | JShell injection |
CWE-707 | Java/Kotlin | java/javaee-expression-injection | Jakarta Expression Language injection |
CWE-707 | Java/Kotlin | java/jython-injection | Injection in Jython |
CWE-707 | Java/Kotlin | java/unsafe-eval | Injection in Java Script Engine |
CWE-707 | Java/Kotlin | java/spring-view-manipulation-implicit | Spring Implicit View Manipulation |
CWE-707 | Java/Kotlin | java/spring-view-manipulation | Spring View Manipulation |
CWE-707 | Java/Kotlin | java/xquery-injection | XQuery query built from user-controlled sources |
CWE-707 | JavaScript/TypeScript | js/angular/disabling-sce | Disabling SCE |
CWE-707 | JavaScript/TypeScript | js/disabling-electron-websecurity | Disabling Electron webSecurity |
CWE-707 | JavaScript/TypeScript | js/enabling-electron-renderer-node-integration | Enabling Node.js integration for Electron web content renderers |
CWE-707 | JavaScript/TypeScript | js/identity-replacement | Replacement of a substring with itself |
CWE-707 | JavaScript/TypeScript | js/path-injection | Uncontrolled data used in path expression |
CWE-707 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-707 | JavaScript/TypeScript | js/command-line-injection | Uncontrolled command line |
CWE-707 | JavaScript/TypeScript | js/indirect-command-line-injection | Indirect uncontrolled command line |
CWE-707 | JavaScript/TypeScript | js/second-order-command-line-injection | Second order command injection |
CWE-707 | JavaScript/TypeScript | js/shell-command-injection-from-environment | Shell command built from environment values |
CWE-707 | JavaScript/TypeScript | js/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-707 | JavaScript/TypeScript | js/unnecessary-use-of-cat | Unnecessary use of cat process |
CWE-707 | JavaScript/TypeScript | js/xss-through-exception | Exception text reinterpreted as HTML |
CWE-707 | JavaScript/TypeScript | js/reflected-xss | Reflected cross-site scripting |
CWE-707 | JavaScript/TypeScript | js/stored-xss | Stored cross-site scripting |
CWE-707 | JavaScript/TypeScript | js/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-707 | JavaScript/TypeScript | js/unsafe-jquery-plugin | Unsafe jQuery plugin |
CWE-707 | JavaScript/TypeScript | js/xss | Client-side cross-site scripting |
CWE-707 | JavaScript/TypeScript | js/xss-through-dom | DOM text reinterpreted as HTML |
CWE-707 | JavaScript/TypeScript | js/sql-injection | Database query built from user-controlled sources |
CWE-707 | JavaScript/TypeScript | js/code-injection | Code injection |
CWE-707 | JavaScript/TypeScript | js/actions/command-injection | Expression injection in Actions |
CWE-707 | JavaScript/TypeScript | js/bad-code-sanitization | Improper code sanitization |
CWE-707 | JavaScript/TypeScript | js/unsafe-code-construction | Unsafe code constructed from library input |
CWE-707 | JavaScript/TypeScript | js/unsafe-dynamic-method-access | Unsafe dynamic method access |
CWE-707 | JavaScript/TypeScript | js/bad-tag-filter | Bad HTML filtering regexp |
CWE-707 | JavaScript/TypeScript | js/double-escaping | Double escaping or unescaping |
CWE-707 | JavaScript/TypeScript | js/incomplete-html-attribute-sanitization | Incomplete HTML attribute sanitization |
CWE-707 | JavaScript/TypeScript | js/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-707 | JavaScript/TypeScript | js/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-707 | JavaScript/TypeScript | js/unsafe-html-expansion | Unsafe expansion of self-closing HTML tag |
CWE-707 | JavaScript/TypeScript | js/log-injection | Log injection |
CWE-707 | JavaScript/TypeScript | js/tainted-format-string | Use of externally-controlled format string |
CWE-707 | JavaScript/TypeScript | js/client-side-unvalidated-url-redirection | Client-side URL redirect |
CWE-707 | JavaScript/TypeScript | js/xpath-injection | XPath injection |
CWE-707 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-707 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-707 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-707 | JavaScript/TypeScript | js/code-injection-dynamic-import | Code injection |
CWE-707 | JavaScript/TypeScript | js/actions/pull-request-target | Checkout of untrusted code in trusted context |
CWE-707 | JavaScript/TypeScript | js/env-key-and-value-injection | User controlled arbitrary environment variable injection |
CWE-707 | JavaScript/TypeScript | js/env-value-injection | User controlled environment variable value injection |
CWE-707 | JavaScript/TypeScript | js/command-line-injection-more-sources | Uncontrolled command line with additional heuristic sources |
CWE-707 | JavaScript/TypeScript | js/xss-more-sources | Client-side cross-site scripting with additional heuristic sources |
CWE-707 | JavaScript/TypeScript | js/sql-injection-more-sources | Database query built from user-controlled sources with additional heuristic sources |
CWE-707 | JavaScript/TypeScript | js/code-injection-more-sources | Code injection with additional heuristic sources |
CWE-707 | JavaScript/TypeScript | js/log-injection-more-sources | Log injection with additional heuristic sources |
CWE-707 | JavaScript/TypeScript | js/tainted-format-string-more-sources | Use of externally-controlled format string with additional heuristic sources |
CWE-707 | JavaScript/TypeScript | js/xpath-injection-more-sources | XPath injection with additional heuristic sources |
CWE-707 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-707 | Python | py/path-injection | Uncontrolled data used in path expression |
CWE-707 | Python | py/command-line-injection | Uncontrolled command line |
CWE-707 | Python | py/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-707 | Python | py/jinja2/autoescape-false | Jinja2 templating with autoescape=False |
CWE-707 | Python | py/reflective-xss | Reflected server-side cross-site scripting |
CWE-707 | Python | py/sql-injection | SQL query built from user-controlled sources |
CWE-707 | Python | py/ldap-injection | LDAP query built from user-controlled sources |
CWE-707 | Python | py/code-injection | Code injection |
CWE-707 | Python | py/http-response-splitting | HTTP Response Splitting |
CWE-707 | Python | py/bad-tag-filter | Bad HTML filtering regexp |
CWE-707 | Python | py/log-injection | Log Injection |
CWE-707 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-707 | Python | py/nosql-injection | NoSQL Injection |
CWE-707 | Python | py/template-injection | Server Side Template Injection |
CWE-707 | Python | py/paramiko-command-injection | Command execution on a secondary remote server |
CWE-707 | Python | py/reflective-xss-email | Reflected server-side cross-site scripting |
CWE-707 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-707 | Python | py/js2py-rce | JavaScript code execution. |
CWE-707 | Python | py/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-707 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-707 | Ruby | rb/ldap-injection | LDAP Injection |
CWE-707 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-707 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-707 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-707 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-707 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-707 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-707 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-707 | Ruby | rb/reflected-xss | Reflected server-side cross-site scripting |
CWE-707 | Ruby | rb/stored-xss | Stored cross-site scripting |
CWE-707 | Ruby | rb/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-707 | Ruby | rb/sql-injection | SQL query built from user-controlled sources |
CWE-707 | Ruby | rb/code-injection | Code injection |
CWE-707 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-707 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-707 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-707 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-707 | Ruby | rb/log-injection | Log injection |
CWE-707 | Ruby | rb/tainted-format-string | Use of externally-controlled format string |
CWE-707 | Swift | swift/path-injection | Uncontrolled data used in path expression |
CWE-707 | Swift | swift/command-line-injection | System command built from user-controlled sources |
CWE-707 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-707 | Swift | swift/sql-injection | Database query built from user-controlled sources |
CWE-707 | Swift | swift/unsafe-js-eval | JavaScript Injection |
CWE-707 | Swift | swift/bad-tag-filter | Bad HTML filtering regexp |
CWE-707 | Swift | swift/uncontrolled-format-string | Uncontrolled format string |
CWE-707 | Swift | swift/predicate-injection | Predicate built from user-controlled sources |
CWE-710 | C/C++ | cpp/unused-local-variable | Unused local variable |
CWE-710 | C/C++ | cpp/unused-static-function | Unused static function |
CWE-710 | C/C++ | cpp/unused-static-variable | Unused static variable |
CWE-710 | C/C++ | cpp/dead-code-condition | Branching condition always evaluates to same value |
CWE-710 | C/C++ | cpp/dead-code-function | Function is never called |
CWE-710 | C/C++ | cpp/dead-code-goto | Dead code due to goto or break statement |
CWE-710 | C/C++ | cpp/double-free | Potential double free |
CWE-710 | C/C++ | cpp/inconsistent-nullness-testing | Inconsistent null check of pointer |
CWE-710 | C/C++ | cpp/incorrectly-checked-scanf | Incorrect return-value check for a 'scanf'-like function |
CWE-710 | C/C++ | cpp/missing-check-scanf | Missing return-value check for a 'scanf'-like function |
CWE-710 | C/C++ | cpp/missing-null-test | Returned pointer not checked |
CWE-710 | C/C++ | cpp/unused-variable | Variable is assigned a value that is never read |
CWE-710 | C/C++ | cpp/fixme-comment | FIXME comment |
CWE-710 | C/C++ | cpp/todo-comment | TODO comment |
CWE-710 | C/C++ | cpp/overflowing-snprintf | Potentially overflowing call to snprintf |
CWE-710 | C/C++ | cpp/wrong-number-format-arguments | Too few arguments to formatting function |
CWE-710 | C/C++ | cpp/wrong-type-format-argument | Wrong type of arguments to formatting function |
CWE-710 | C/C++ | cpp/inconsistent-null-check | Inconsistent nullness check |
CWE-710 | C/C++ | cpp/useless-expression | Expression has no effect |
CWE-710 | C/C++ | cpp/pointer-overflow-check | Pointer overflow check |
CWE-710 | C/C++ | cpp/bad-strncpy-size | Possibly wrong buffer size in string copy |
CWE-710 | C/C++ | cpp/suspicious-call-to-memset | Suspicious call to memset |
CWE-710 | C/C++ | cpp/unsafe-strncat | Potentially unsafe call to strncat |
CWE-710 | C/C++ | cpp/unsafe-strcat | Potentially unsafe use of strcat |
CWE-710 | C/C++ | cpp/redundant-null-check-simple | Redundant null check due to previous dereference |
CWE-710 | C/C++ | cpp/too-few-arguments | Call to function with fewer arguments than declared parameters |
CWE-710 | C/C++ | cpp/ignore-return-value-sal | SAL requires inspecting return value |
CWE-710 | C/C++ | cpp/memset-may-be-deleted | Call to memset may be deleted |
CWE-710 | C/C++ | cpp/hresult-boolean-conversion | Cast between HRESULT and a Boolean type |
CWE-710 | C/C++ | cpp/incorrect-allocation-error-handling | Incorrect allocation-error handling |
CWE-710 | C/C++ | cpp/dangerous-function-overflow | Use of dangerous function |
CWE-710 | C/C++ | cpp/dangerous-cin | Dangerous use of 'cin' |
CWE-710 | C/C++ | cpp/potentially-dangerous-function | Use of potentially dangerous function |
CWE-710 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-710 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-710 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-710 | C/C++ | cpp/deref-null-result | Null dereference from a function result |
CWE-710 | C/C++ | cpp/redundant-null-check-param | Redundant null check or missing null check of parameter |
CWE-710 | C/C++ | cpp/work-with-changing-working-directories | Find work with changing working directories, with security errors. |
CWE-710 | C/C++ | cpp/wrong-use-of-the-umask | Find the wrong use of the umask function. |
CWE-710 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-710 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-710 | C/C++ | cpp/operator-find-incorrectly-used-switch | Incorrect switch statement |
CWE-710 | C/C++ | cpp/double-release | Errors When Double Release |
CWE-710 | C/C++ | cpp/errors-of-undefined-program-behavior | Errors Of Undefined Program Behavior |
CWE-710 | C# | cs/call-to-obsolete-method | Call to obsolete method |
CWE-710 | C# | cs/inconsistent-equals-and-gethashcode | Inconsistent Equals(object) and GetHashCode() |
CWE-710 | C# | cs/todo-comment | TODO comment |
CWE-710 | C# | cs/dereferenced-value-is-always-null | Dereferenced variable is always null |
CWE-710 | C# | cs/dereferenced-value-may-be-null | Dereferenced variable may be null |
CWE-710 | C# | cs/unused-reftype | Dead reference types |
CWE-710 | C# | cs/useless-assignment-to-local | Useless assignment to local variable |
CWE-710 | C# | cs/unused-field | Unused field |
CWE-710 | C# | cs/unused-method | Unused method |
CWE-710 | C# | cs/captured-foreach-variable | Capturing a foreach variable |
CWE-710 | C# | cs/useless-cast-to-self | Cast to same type |
CWE-710 | C# | cs/useless-is-before-as | Useless 'is' before 'as' |
CWE-710 | C# | cs/coalesce-of-identical-expressions | Useless ?? expression |
CWE-710 | C# | cs/useless-type-test | Useless type test |
CWE-710 | C# | cs/useless-upcast | Useless upcast |
CWE-710 | C# | cs/empty-collection | Container contents are never initialized |
CWE-710 | C# | cs/unused-collection | Container contents are never accessed |
CWE-710 | C# | cs/invalid-dynamic-call | Bad dynamic call |
CWE-710 | C# | cs/empty-lock-statement | Empty lock statement |
CWE-710 | C# | cs/linq/useless-select | Redundant Select |
CWE-710 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-710 | C# | cs/web/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-710 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-710 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-710 | Go | go/comparison-of-identical-expressions | Comparison of identical values |
CWE-710 | Go | go/useless-assignment-to-field | Useless assignment to field |
CWE-710 | Go | go/useless-assignment-to-local | Useless assignment to local variable |
CWE-710 | Go | go/duplicate-branches | Duplicate 'if' branches |
CWE-710 | Go | go/duplicate-condition | Duplicate 'if' condition |
CWE-710 | Go | go/duplicate-switch-case | Duplicate switch case |
CWE-710 | Go | go/useless-expression | Expression has no effect |
CWE-710 | Go | go/redundant-operation | Identical operands |
CWE-710 | Go | go/redundant-assignment | Self assignment |
CWE-710 | Go | go/unreachable-statement | Unreachable statement |
CWE-710 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-710 | Go | go/pam-auth-bypass | PAM authorization bypass due to incorrect usage |
CWE-710 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-710 | Java/Kotlin | java/deprecated-call | Deprecated method or constructor invocation |
CWE-710 | Java/Kotlin | java/dead-class | Dead class |
CWE-710 | Java/Kotlin | java/dead-enum-constant | Dead enum constant |
CWE-710 | Java/Kotlin | java/dead-field | Dead field |
CWE-710 | Java/Kotlin | java/dead-function | Dead method |
CWE-710 | Java/Kotlin | java/lines-of-dead-code | Lines of dead code in files |
CWE-710 | Java/Kotlin | java/unused-parameter | Useless parameter |
CWE-710 | Java/Kotlin | java/ejb/container-interference | EJB interferes with container operation |
CWE-710 | Java/Kotlin | java/ejb/file-io | EJB uses file input/output |
CWE-710 | Java/Kotlin | java/ejb/graphics | EJB uses graphics |
CWE-710 | Java/Kotlin | java/ejb/native-code | EJB uses native code |
CWE-710 | Java/Kotlin | java/ejb/reflection | EJB uses reflection |
CWE-710 | Java/Kotlin | java/ejb/security-configuration-access | EJB accesses security configuration |
CWE-710 | Java/Kotlin | java/ejb/substitution-in-serialization | EJB uses substitution in serialization |
CWE-710 | Java/Kotlin | java/ejb/socket-or-stream-handler-factory | EJB sets socket factory or URL stream handler factory |
CWE-710 | Java/Kotlin | java/ejb/server-socket | EJB uses server socket |
CWE-710 | Java/Kotlin | java/ejb/non-final-static-field | EJB uses non-final static field |
CWE-710 | Java/Kotlin | java/ejb/synchronization | EJB uses synchronization |
CWE-710 | Java/Kotlin | java/ejb/this | EJB uses 'this' as argument or result |
CWE-710 | Java/Kotlin | java/ejb/threads | EJB uses threads |
CWE-710 | Java/Kotlin | java/useless-null-check | Useless null check |
CWE-710 | Java/Kotlin | java/useless-type-test | Useless type test |
CWE-710 | Java/Kotlin | java/useless-upcast | Useless upcast |
CWE-710 | Java/Kotlin | java/missing-call-to-super-clone | Missing super clone |
CWE-710 | Java/Kotlin | java/empty-container | Container contents are never initialized |
CWE-710 | Java/Kotlin | java/unused-container | Container contents are never accessed |
CWE-710 | Java/Kotlin | java/inconsistent-equals-and-hashcode | Inconsistent equals and hashCode |
CWE-710 | Java/Kotlin | java/constant-comparison | Useless comparison test |
CWE-710 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-710 | Java/Kotlin | java/missing-super-finalize | Finalizer inconsistency |
CWE-710 | Java/Kotlin | java/missing-format-argument | Missing format argument |
CWE-710 | Java/Kotlin | java/unused-format-argument | Unused format argument |
CWE-710 | Java/Kotlin | java/dereferenced-value-is-always-null | Dereferenced variable is always null |
CWE-710 | Java/Kotlin | java/dereferenced-expr-may-be-null | Dereferenced expression may be null |
CWE-710 | Java/Kotlin | java/dereferenced-value-may-be-null | Dereferenced variable may be null |
CWE-710 | Java/Kotlin | java/empty-synchronized-block | Empty synchronized block |
CWE-710 | Java/Kotlin | java/unreachable-catch-clause | Unreachable catch clause |
CWE-710 | Java/Kotlin | java/static-initialization-vector | Using a static initialization vector for encryption |
CWE-710 | Java/Kotlin | java/potentially-dangerous-function | Use of a potentially dangerous function |
CWE-710 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-710 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-710 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-710 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-710 | Java/Kotlin | java/todo-comment | TODO/FIXME comments |
CWE-710 | Java/Kotlin | java/unused-reference-type | Unused classes and interfaces |
CWE-710 | Java/Kotlin | java/overwritten-assignment-to-local | Assigned value is overwritten |
CWE-710 | Java/Kotlin | java/useless-assignment-to-local | Useless assignment to local variable |
CWE-710 | Java/Kotlin | java/empty-finalizer | Empty body of finalizer |
CWE-710 | Java/Kotlin | java/unused-initialized-local | Local variable is initialized but not used |
CWE-710 | Java/Kotlin | java/local-variable-is-never-read | Unread local variable |
CWE-710 | Java/Kotlin | java/unused-field | Unused field |
CWE-710 | Java/Kotlin | java/unused-label | Unused label |
CWE-710 | Java/Kotlin | java/unused-local-variable | Unused local variable |
CWE-710 | Java/Kotlin | java/switch-fall-through | Unterminated switch case |
CWE-710 | Java/Kotlin | java/redundant-cast | Unnecessary cast |
CWE-710 | Java/Kotlin | java/unused-import | Unnecessary import |
CWE-710 | JavaScript/TypeScript | js/todo-comment | TODO comment |
CWE-710 | JavaScript/TypeScript | js/conflicting-html-attribute | Conflicting HTML element attributes |
CWE-710 | JavaScript/TypeScript | js/malformed-html-id | Malformed id attribute |
CWE-710 | JavaScript/TypeScript | js/eval-like-call | Call to eval-like DOM function |
CWE-710 | JavaScript/TypeScript | js/variable-initialization-conflict | Conflicting variable initialization |
CWE-710 | JavaScript/TypeScript | js/function-declaration-conflict | Conflicting function declarations |
CWE-710 | JavaScript/TypeScript | js/useless-assignment-to-global | Useless assignment to global variable |
CWE-710 | JavaScript/TypeScript | js/useless-assignment-to-local | Useless assignment to local variable |
CWE-710 | JavaScript/TypeScript | js/overwritten-property | Overwritten property |
CWE-710 | JavaScript/TypeScript | js/comparison-of-identical-expressions | Comparison of identical values |
CWE-710 | JavaScript/TypeScript | js/comparison-with-nan | Comparison with NaN |
CWE-710 | JavaScript/TypeScript | js/duplicate-condition | Duplicate 'if' condition |
CWE-710 | JavaScript/TypeScript | js/duplicate-property | Duplicate property |
CWE-710 | JavaScript/TypeScript | js/duplicate-switch-case | Duplicate switch case |
CWE-710 | JavaScript/TypeScript | js/useless-expression | Expression has no effect |
CWE-710 | JavaScript/TypeScript | js/comparison-between-incompatible-types | Comparison between inconvertible types |
CWE-710 | JavaScript/TypeScript | js/redundant-operation | Identical operands |
CWE-710 | JavaScript/TypeScript | js/redundant-assignment | Self assignment |
CWE-710 | JavaScript/TypeScript | js/call-to-non-callable | Invocation of non-function |
CWE-710 | JavaScript/TypeScript | js/property-access-on-non-object | Property access on null or undefined |
CWE-710 | JavaScript/TypeScript | js/unneeded-defensive-code | Unneeded defensive code |
CWE-710 | JavaScript/TypeScript | js/useless-type-test | Useless type test |
CWE-710 | JavaScript/TypeScript | js/conditional-comment | Conditional comments |
CWE-710 | JavaScript/TypeScript | js/eval-call | Use of eval |
CWE-710 | JavaScript/TypeScript | js/non-standard-language-feature | Use of platform-specific language features |
CWE-710 | JavaScript/TypeScript | js/for-in-comprehension | Use of for-in comprehension blocks |
CWE-710 | JavaScript/TypeScript | js/superfluous-trailing-arguments | Superfluous trailing arguments |
CWE-710 | JavaScript/TypeScript | js/yield-outside-generator | Yield in non-generator function |
CWE-710 | JavaScript/TypeScript | js/node/assignment-to-exports-variable | Assignment to exports variable |
CWE-710 | JavaScript/TypeScript | js/regex/unmatchable-caret | Unmatchable caret in regular expression |
CWE-710 | JavaScript/TypeScript | js/regex/unmatchable-dollar | Unmatchable dollar in regular expression |
CWE-710 | JavaScript/TypeScript | js/remote-property-injection | Remote property injection |
CWE-710 | JavaScript/TypeScript | js/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-710 | JavaScript/TypeScript | js/hardcoded-data-interpreted-as-code | Hard-coded data interpreted as code |
CWE-710 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-710 | JavaScript/TypeScript | js/http-to-file-access | Network data written to file |
CWE-710 | JavaScript/TypeScript | js/useless-assignment-in-return | Return statement assigns local variable |
CWE-710 | JavaScript/TypeScript | js/unreachable-statement | Unreachable statement |
CWE-710 | JavaScript/TypeScript | js/trivial-conditional | Useless conditional |
CWE-710 | JavaScript/TypeScript | js/remote-property-injection-more-sources | Remote property injection with additional heuristic sources |
CWE-710 | Python | py/equals-hash-mismatch | Inconsistent equality and hashing |
CWE-710 | Python | py/call/wrong-named-class-argument | Wrong name for an argument in a class instantiation |
CWE-710 | Python | py/call/wrong-number-class-arguments | Wrong number of arguments in a class instantiation |
CWE-710 | Python | py/unreachable-except | Unreachable 'except' block |
CWE-710 | Python | py/super-not-enclosing-class | First argument to super() is not enclosing class |
CWE-710 | Python | py/comparison-of-constants | Comparison of constants |
CWE-710 | Python | py/comparison-of-identical-expressions | Comparison of identical values |
CWE-710 | Python | py/comparison-missing-self | Maybe missing 'self' in comparison |
CWE-710 | Python | py/redundant-comparison | Redundant comparison |
CWE-710 | Python | py/duplicate-key-dict-literal | Duplicate key in dict literal |
CWE-710 | Python | py/call/wrong-named-argument | Wrong name for an argument in a call |
CWE-710 | Python | py/percent-format/wrong-arguments | Wrong number of arguments for format |
CWE-710 | Python | py/call/wrong-arguments | Wrong number of arguments in a call |
CWE-710 | Python | py/import-deprecated-module | Import of deprecated module |
CWE-710 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-710 | Python | py/constant-conditional-expression | Constant in conditional expression or statement |
CWE-710 | Python | py/redundant-assignment | Redundant assignment |
CWE-710 | Python | py/ineffectual-statement | Statement has no effect |
CWE-710 | Python | py/unreachable-statement | Unreachable code |
CWE-710 | Python | py/multiple-definition | Variable defined multiple times |
CWE-710 | Python | py/unused-local-variable | Unused local variable |
CWE-710 | Python | py/unused-global-variable | Unused global variable |
CWE-710 | Ruby | rb/hardcoded-data-interpreted-as-code | Hard-coded data interpreted as code |
CWE-710 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-710 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-710 | Ruby | rb/useless-assignment-to-local | Useless assignment to local variable |
CWE-710 | Ruby | rb/unused-parameter | Unused parameter. |
CWE-710 | Swift | swift/static-initialization-vector | Static initialization vector for encryption |
CWE-710 | Swift | swift/constant-password | Constant password |
CWE-710 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-732 | C/C++ | cpp/world-writable-file-creation | File created without restricting permissions |
CWE-732 | C/C++ | cpp/open-call-with-mode-argument | File opened with O_CREAT flag but without mode argument |
CWE-732 | C/C++ | cpp/unsafe-dacl-security-descriptor | Setting a DACL to NULL in a SECURITY_DESCRIPTOR |
CWE-732 | Java/Kotlin | java/local-temp-file-or-directory-information-disclosure | Local information disclosure in a temporary directory |
CWE-732 | Java/Kotlin | java/world-writable-file-read | Reading from a world writable file |
CWE-732 | Python | py/overly-permissive-file | Overly permissive file permissions |
CWE-732 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-732 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-733 | C/C++ | cpp/memset-may-be-deleted | Call to memset may be deleted |
CWE-749 | Java/Kotlin | java/android/unsafe-android-webview-fetch | Unsafe resource fetching in Android WebView |
CWE-749 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-749 | Swift | swift/unsafe-js-eval | JavaScript Injection |
CWE-754 | C/C++ | cpp/incorrectly-checked-scanf | Incorrect return-value check for a 'scanf'-like function |
CWE-754 | C/C++ | cpp/missing-check-scanf | Missing return-value check for a 'scanf'-like function |
CWE-754 | C/C++ | cpp/return-value-ignored | Return value of a function is ignored |
CWE-754 | C/C++ | cpp/overflowing-snprintf | Potentially overflowing call to snprintf |
CWE-754 | C/C++ | cpp/inconsistent-call-on-result | Inconsistent operation on return value |
CWE-754 | C/C++ | cpp/ignore-return-value-sal | SAL requires inspecting return value |
CWE-754 | C/C++ | cpp/hresult-boolean-conversion | Cast between HRESULT and a Boolean type |
CWE-754 | C/C++ | cpp/incorrect-allocation-error-handling | Incorrect allocation-error handling |
CWE-754 | C/C++ | cpp/work-with-changing-working-directories | Find work with changing working directories, with security errors. |
CWE-754 | C/C++ | cpp/drop-linux-privileges-outoforder | LinuxPrivilegeDroppingOutoforder |
CWE-754 | C/C++ | cpp/improper-check-return-value-scanf | Improper check of return value of scanf |
CWE-754 | C# | cs/unchecked-return-value | Unchecked return value |
CWE-754 | Java/Kotlin | java/inconsistent-call-on-result | Inconsistent operation on return value |
CWE-754 | Java/Kotlin | java/return-value-ignored | Method result ignored |
CWE-754 | Java/Kotlin | java/unsafe-cert-trust | Unsafe certificate trust |
CWE-754 | JavaScript/TypeScript | js/unvalidated-dynamic-method-call | Unvalidated dynamic method call |
CWE-754 | Python | py/ignored-return-value | Ignored return value |
CWE-755 | C/C++ | cpp/incorrect-allocation-error-handling | Incorrect allocation-error handling |
CWE-755 | C/C++ | cpp/operator-find-incorrectly-used-exceptions | Operator Find Incorrectly Used Exceptions |
CWE-755 | C# | cs/dispose-not-called-on-throw | Dispose may not be called if an exception is thrown during execution |
CWE-755 | C# | cs/local-not-disposed | Missing Dispose call on local IDisposable |
CWE-755 | C# | cs/catch-nullreferenceexception | Poor error handling: catch of NullReferenceException |
CWE-755 | C# | cs/empty-catch-block | Poor error handling: empty catch block |
CWE-755 | C# | cs/catch-of-all-exceptions | Generic catch clause |
CWE-755 | C# | cs/information-exposure-through-exception | Information exposure through an exception |
CWE-755 | C# | cs/web/missing-global-error-handler | Missing global error handler |
CWE-755 | Go | go/stack-trace-exposure | Information exposure through a stack trace |
CWE-755 | Java/Kotlin | java/error-message-exposure | Information exposure through an error message |
CWE-755 | Java/Kotlin | java/stack-trace-exposure | Information exposure through a stack trace |
CWE-755 | Java/Kotlin | java/overly-general-catch | Overly-general catch clause |
CWE-755 | Java/Kotlin | java/android/nfe-local-android-dos | Local Android DoS Caused By NumberFormatException |
CWE-755 | JavaScript/TypeScript | js/stack-trace-exposure | Information exposure through a stack trace |
CWE-755 | Python | py/catch-base-exception | Except block handles 'BaseException' |
CWE-755 | Python | py/empty-except | Empty except |
CWE-755 | Python | py/stack-trace-exposure | Information exposure through an exception |
CWE-755 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-756 | C# | cs/web/missing-global-error-handler | Missing global error handler |
CWE-757 | Swift | swift/insecure-tls | Insecure TLS configuration |
CWE-758 | C/C++ | cpp/pointer-overflow-check | Pointer overflow check |
CWE-758 | C/C++ | cpp/memset-may-be-deleted | Call to memset may be deleted |
CWE-758 | C/C++ | cpp/errors-of-undefined-program-behavior | Errors Of Undefined Program Behavior |
CWE-758 | C# | cs/captured-foreach-variable | Capturing a foreach variable |
CWE-758 | JavaScript/TypeScript | js/conflicting-html-attribute | Conflicting HTML element attributes |
CWE-758 | JavaScript/TypeScript | js/malformed-html-id | Malformed id attribute |
CWE-758 | JavaScript/TypeScript | js/conditional-comment | Conditional comments |
CWE-758 | JavaScript/TypeScript | js/non-standard-language-feature | Use of platform-specific language features |
CWE-758 | JavaScript/TypeScript | js/for-in-comprehension | Use of for-in comprehension blocks |
CWE-758 | JavaScript/TypeScript | js/yield-outside-generator | Yield in non-generator function |
CWE-759 | C# | cs/hash-without-salt | Use of a hash function without a salt |
CWE-759 | Java/Kotlin | java/hash-without-salt | Use of a hash function without a salt |
CWE-760 | Swift | swift/constant-salt | Use of constant salts |
CWE-764 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-764 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-764 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-764 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-770 | C/C++ | cpp/alloca-in-loop | Call to alloca in a loop |
CWE-770 | C/C++ | cpp/uncontrolled-allocation-size | Uncontrolled allocation size |
CWE-770 | Go | go/uncontrolled-allocation-size | Slice memory allocation with excessive size value |
CWE-770 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-770 | JavaScript/TypeScript | js/resource-exhaustion | Resource exhaustion |
CWE-770 | JavaScript/TypeScript | js/resource-exhaustion-more-sources | Resource exhaustion with additional heuristic sources |
CWE-770 | Python | py/unicode-dos | Denial of Service using Unicode Characters |
CWE-772 | C/C++ | cpp/catch-missing-free | Leaky catch |
CWE-772 | C/C++ | cpp/descriptor-may-not-be-closed | Open descriptor may not be closed |
CWE-772 | C/C++ | cpp/descriptor-never-closed | Open descriptor never closed |
CWE-772 | C/C++ | cpp/file-may-not-be-closed | Open file may not be closed |
CWE-772 | C/C++ | cpp/file-never-closed | Open file is not closed |
CWE-772 | C/C++ | cpp/memory-may-not-be-freed | Memory may not be freed |
CWE-772 | C/C++ | cpp/memory-never-freed | Memory is never freed |
CWE-772 | C/C++ | cpp/new-free-mismatch | Mismatching new/free or malloc/delete |
CWE-772 | C/C++ | cpp/memory-leak-on-failed-call-to-realloc | Memory leak on failed call to realloc |
CWE-772 | Java/Kotlin | java/input-resource-leak | Potential input resource leak |
CWE-772 | Java/Kotlin | java/database-resource-leak | Potential database resource leak |
CWE-772 | Java/Kotlin | java/output-resource-leak | Potential output resource leak |
CWE-772 | Python | py/file-not-closed | File is not always closed |
CWE-775 | C/C++ | cpp/descriptor-may-not-be-closed | Open descriptor may not be closed |
CWE-775 | C/C++ | cpp/descriptor-never-closed | Open descriptor never closed |
CWE-775 | C/C++ | cpp/file-may-not-be-closed | Open file may not be closed |
CWE-775 | C/C++ | cpp/file-never-closed | Open file is not closed |
CWE-776 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-776 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-776 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-776 | JavaScript/TypeScript | js/xml-bomb | XML internal entity expansion |
CWE-776 | JavaScript/TypeScript | js/xml-bomb-more-sources | XML internal entity expansion with additional heuristic sources |
CWE-776 | Python | py/xml-bomb | XML internal entity expansion |
CWE-776 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-776 | Ruby | rb/xxe | XML external entity expansion |
CWE-776 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-780 | C# | cs/inadequate-rsa-padding | Weak encryption: inadequate RSA padding |
CWE-780 | Java/Kotlin | java/rsa-without-oaep | Use of RSA algorithm without OAEP |
CWE-783 | C/C++ | cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations | Operator Precedence Logic Error When Use Bitwise Or Logical Operations |
CWE-783 | C/C++ | cpp/operator-precedence-logic-error-when-use-bool-type | Operator Precedence Logic Error When Use Bool Type |
CWE-783 | Go | go/whitespace-contradicts-precedence | Whitespace contradicts operator precedence |
CWE-783 | Java/Kotlin | java/whitespace-contradicts-precedence | Whitespace contradicts operator precedence |
CWE-783 | JavaScript/TypeScript | js/unclear-operator-precedence | Unclear precedence of nested operators |
CWE-783 | JavaScript/TypeScript | js/whitespace-contradicts-precedence | Whitespace contradicts operator precedence |
CWE-787 | C/C++ | cpp/allocation-too-small | Not enough memory allocated for pointer type |
CWE-787 | C/C++ | cpp/suspicious-allocation-size | Not enough memory allocated for array of pointer type |
CWE-787 | C/C++ | cpp/overflow-buffer | Call to memory access function may overflow buffer |
CWE-787 | C/C++ | cpp/badly-bounded-write | Badly bounded write |
CWE-787 | C/C++ | cpp/overrunning-write | Potentially overrunning write |
CWE-787 | C/C++ | cpp/overrunning-write-with-float | Potentially overrunning write with float to string conversion |
CWE-787 | C/C++ | cpp/unbounded-write | Unbounded write |
CWE-787 | C/C++ | cpp/very-likely-overrunning-write | Likely overrunning write |
CWE-787 | C/C++ | cpp/unterminated-variadic-call | Unterminated variadic call |
CWE-787 | C/C++ | cpp/no-space-for-terminator | No space for zero terminator |
CWE-787 | C/C++ | cpp/invalid-pointer-deref | Invalid pointer dereference |
CWE-787 | C/C++ | cpp/sign-conversion-pointer-arithmetic | unsigned to signed used in pointer arithmetic |
CWE-787 | C# | cs/unvalidated-local-pointer-arithmetic | Unvalidated local pointer arithmetic |
CWE-788 | C/C++ | cpp/allocation-too-small | Not enough memory allocated for pointer type |
CWE-788 | C/C++ | cpp/suspicious-allocation-size | Not enough memory allocated for array of pointer type |
CWE-788 | C/C++ | cpp/unsafe-strncat | Potentially unsafe call to strncat |
CWE-788 | C/C++ | cpp/overflow-buffer | Call to memory access function may overflow buffer |
CWE-788 | C/C++ | cpp/unterminated-variadic-call | Unterminated variadic call |
CWE-788 | C/C++ | cpp/no-space-for-terminator | No space for zero terminator |
CWE-788 | C/C++ | cpp/openssl-heartbleed | Use of a version of OpenSSL with Heartbleed |
CWE-788 | C/C++ | cpp/access-memory-location-after-end-buffer-strlen | Access Of Memory Location After End Of Buffer |
CWE-788 | C# | cs/unvalidated-local-pointer-arithmetic | Unvalidated local pointer arithmetic |
CWE-788 | Go | go/wrong-usage-of-unsafe | Wrong usage of package unsafe |
CWE-789 | C/C++ | cpp/uncontrolled-allocation-size | Uncontrolled allocation size |
CWE-798 | C# | cs/hard-coded-symmetric-encryption-key | Hard-coded symmetric encryption key |
CWE-798 | C# | cs/hardcoded-connection-string-credentials | Hard-coded connection string with credentials |
CWE-798 | C# | cs/hardcoded-credentials | Hard-coded credentials |
CWE-798 | Go | go/hardcoded-credentials | Hard-coded credentials |
CWE-798 | Go | go/parse-jwt-with-hardcoded-key | Decoding JWT with hardcoded key |
CWE-798 | Java/Kotlin | java/hardcoded-credential-api-call | Hard-coded credential in API call |
CWE-798 | Java/Kotlin | java/hardcoded-credential-comparison | Hard-coded credential comparison |
CWE-798 | Java/Kotlin | java/hardcoded-credential-sensitive-call | Hard-coded credential in sensitive call |
CWE-798 | Java/Kotlin | java/hardcoded-password-field | Hard-coded password field |
CWE-798 | JavaScript/TypeScript | js/hardcoded-credentials | Hard-coded credentials |
CWE-798 | Python | py/hardcoded-credentials | Hard-coded credentials |
CWE-798 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-798 | Swift | swift/constant-password | Constant password |
CWE-798 | Swift | swift/hardcoded-key | Hard-coded encryption key |
CWE-799 | JavaScript/TypeScript | js/missing-rate-limiting | Missing rate limiting |
CWE-805 | C/C++ | cpp/badly-bounded-write | Badly bounded write |
CWE-805 | C/C++ | cpp/overrunning-write | Potentially overrunning write |
CWE-805 | C/C++ | cpp/overrunning-write-with-float | Potentially overrunning write with float to string conversion |
CWE-805 | C/C++ | cpp/unbounded-write | Unbounded write |
CWE-805 | C/C++ | cpp/very-likely-overrunning-write | Likely overrunning write |
CWE-805 | C/C++ | cpp/buffer-access-with-incorrect-length-value | Buffer access with incorrect length value |
CWE-807 | C/C++ | cpp/tainted-permissions-check | Untrusted input for a condition |
CWE-807 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-807 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-807 | Java/Kotlin | java/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-807 | Java/Kotlin | java/tainted-permissions-check | User-controlled data used in permissions check |
CWE-807 | JavaScript/TypeScript | js/user-controlled-bypass | User-controlled bypass of security check |
CWE-807 | JavaScript/TypeScript | js/different-kinds-comparison-bypass | Comparison of user-controlled data of different kinds |
CWE-807 | JavaScript/TypeScript | js/user-controlled-bypass-more-sources | User-controlled bypass of security check with additional heuristic sources |
CWE-807 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-820 | C# | cs/unsynchronized-static-access | Unsynchronized access to static collection member in non-static context |
CWE-820 | Java/Kotlin | java/lazy-initialization | Incorrect lazy initialization of a static field |
CWE-820 | Java/Kotlin | java/non-sync-override | Non-synchronized override of synchronized method |
CWE-821 | Java/Kotlin | java/ejb/synchronization | EJB uses synchronization |
CWE-821 | Java/Kotlin | java/call-to-thread-run | Direct call to a run() method |
CWE-823 | C/C++ | cpp/late-negative-test | Pointer offset used before it is checked |
CWE-823 | C/C++ | cpp/missing-negativity-test | Unchecked return value used as offset |
CWE-825 | C/C++ | cpp/double-free | Potential double free |
CWE-825 | C/C++ | cpp/use-after-free | Potential use after free |
CWE-825 | C/C++ | cpp/return-stack-allocated-memory | Returning stack-allocated memory |
CWE-825 | C/C++ | cpp/using-expired-stack-address | Use of expired stack-address |
CWE-825 | C/C++ | cpp/iterator-to-expired-container | Iterator to expired container |
CWE-825 | C/C++ | cpp/use-of-string-after-lifetime-ends | Use of string after lifetime ends |
CWE-825 | C/C++ | cpp/use-of-unique-pointer-after-lifetime-ends | Use of unique pointer after lifetime ends |
CWE-825 | C/C++ | cpp/experimental-double-free | Errors When Double Free |
CWE-825 | C/C++ | cpp/use-after-expired-lifetime | Use of object after its lifetime has ended |
CWE-825 | C/C++ | cpp/dangerous-use-of-exception-blocks | Dangerous use of exception blocks. |
CWE-826 | C/C++ | cpp/self-assignment-check | Self assignment check |
CWE-827 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-827 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-827 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-827 | JavaScript/TypeScript | js/xxe | XML external entity expansion |
CWE-827 | JavaScript/TypeScript | js/xxe-more-sources | XML external entity expansion with additional heuristic sources |
CWE-827 | Python | py/xxe | XML external entity expansion |
CWE-827 | Ruby | rb/xxe | XML external entity expansion |
CWE-827 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-829 | C# | cs/web/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-829 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-829 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-829 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-829 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-829 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-829 | JavaScript/TypeScript | js/missing-x-frame-options | Missing X-Frame-Options HTTP header |
CWE-829 | JavaScript/TypeScript | js/xxe | XML external entity expansion |
CWE-829 | JavaScript/TypeScript | js/insecure-download | Download of sensitive file through insecure connection |
CWE-829 | JavaScript/TypeScript | js/functionality-from-untrusted-domain | Untrusted domain used in script or other content |
CWE-829 | JavaScript/TypeScript | js/functionality-from-untrusted-source | Inclusion of functionality from an untrusted source |
CWE-829 | JavaScript/TypeScript | js/xxe-more-sources | XML external entity expansion with additional heuristic sources |
CWE-829 | Python | py/xxe | XML external entity expansion |
CWE-829 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-829 | Ruby | rb/xxe | XML external entity expansion |
CWE-829 | Ruby | rb/insecure-download | Download of sensitive file through insecure connection |
CWE-829 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-830 | JavaScript/TypeScript | js/functionality-from-untrusted-domain | Untrusted domain used in script or other content |
CWE-830 | JavaScript/TypeScript | js/functionality-from-untrusted-source | Inclusion of functionality from an untrusted source |
CWE-833 | C/C++ | cpp/lock-order-cycle | Cyclic lock order dependency |
CWE-833 | C/C++ | cpp/twice-locked | Mutex locked twice |
CWE-833 | C/C++ | cpp/unreleased-lock | Lock may not be released |
CWE-833 | C# | cs/locked-wait | A lock is held during a wait |
CWE-833 | Java/Kotlin | java/sleep-with-lock-held | Sleep with lock held |
CWE-833 | Java/Kotlin | java/unreleased-lock | Unreleased lock |
CWE-833 | Java/Kotlin | java/wait-with-two-locks | Wait with two locks held |
CWE-833 | Java/Kotlin | java/lock-order-inconsistency | Lock order inconsistency |
CWE-834 | C/C++ | cpp/inconsistent-loop-direction | Inconsistent direction of for loop |
CWE-834 | C/C++ | cpp/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-834 | C/C++ | cpp/infinite-loop-with-unsatisfiable-exit-condition | Infinite loop with unsatisfiable exit condition |
CWE-834 | C# | cs/constant-condition | Constant condition |
CWE-834 | C# | cs/linq/inconsistent-enumeration | Bad multiple iteration |
CWE-834 | C# | cs/xml/insecure-dtd-handling | Untrusted XML is read insecurely |
CWE-834 | C# | cs/insecure-xml-read | XML is read insecurely |
CWE-834 | Go | go/inconsistent-loop-direction | Inconsistent direction of for loop |
CWE-834 | Java/Kotlin | java/constant-loop-condition | Constant loop condition |
CWE-834 | Java/Kotlin | java/xxe | Resolving XML external entity in user-controlled data |
CWE-834 | Java/Kotlin | java/unreachable-exit-in-loop | Loop with unreachable exit condition |
CWE-834 | JavaScript/TypeScript | js/xml-bomb | XML internal entity expansion |
CWE-834 | JavaScript/TypeScript | js/loop-bound-injection | Loop bound injection |
CWE-834 | JavaScript/TypeScript | js/inconsistent-loop-direction | Inconsistent direction of for loop |
CWE-834 | JavaScript/TypeScript | js/xml-bomb-more-sources | XML internal entity expansion with additional heuristic sources |
CWE-834 | Python | py/xml-bomb | XML internal entity expansion |
CWE-834 | Python | py/simple-xml-rpc-server-dos | SimpleXMLRPCServer denial of service |
CWE-834 | Ruby | rb/xxe | XML external entity expansion |
CWE-834 | Swift | swift/xxe | Resolving XML external entity in user-controlled data |
CWE-835 | C/C++ | cpp/inconsistent-loop-direction | Inconsistent direction of for loop |
CWE-835 | C/C++ | cpp/comparison-with-wider-type | Comparison of narrow type with wide type in loop condition |
CWE-835 | C/C++ | cpp/infinite-loop-with-unsatisfiable-exit-condition | Infinite loop with unsatisfiable exit condition |
CWE-835 | C# | cs/constant-condition | Constant condition |
CWE-835 | Go | go/inconsistent-loop-direction | Inconsistent direction of for loop |
CWE-835 | Java/Kotlin | java/constant-loop-condition | Constant loop condition |
CWE-835 | Java/Kotlin | java/unreachable-exit-in-loop | Loop with unreachable exit condition |
CWE-835 | JavaScript/TypeScript | js/inconsistent-loop-direction | Inconsistent direction of for loop |
CWE-838 | C# | cs/inappropriate-encoding | Inappropriate encoding |
CWE-843 | C/C++ | cpp/upcast-array-pointer-arithmetic | Upcast array used in pointer arithmetic |
CWE-843 | C/C++ | cpp/type-confusion | Type confusion |
CWE-843 | JavaScript/TypeScript | js/type-confusion-through-parameter-tampering | Type confusion through parameter tampering |
CWE-862 | C# | cs/empty-password-in-configuration | Empty password in configuration file |
CWE-862 | C# | cs/web/missing-function-level-access-control | Missing function level access control |
CWE-862 | C# | cs/web/insecure-direct-object-reference | Insecure Direct Object Reference |
CWE-862 | Java/Kotlin | java/incorrect-url-verification | Incorrect URL verification |
CWE-862 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-862 | JavaScript/TypeScript | js/empty-password-in-configuration-file | Empty password in configuration file |
CWE-862 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-863 | Java/Kotlin | java/permissive-dot-regex | URL matched by permissive . in a regular expression |
CWE-908 | C/C++ | cpp/improper-check-return-value-scanf | Improper check of return value of scanf |
CWE-909 | C/C++ | cpp/initialization-not-run | Initialization code not run |
CWE-912 | JavaScript/TypeScript | js/hardcoded-data-interpreted-as-code | Hard-coded data interpreted as code |
CWE-912 | JavaScript/TypeScript | js/http-to-file-access | Network data written to file |
CWE-912 | Ruby | rb/hardcoded-data-interpreted-as-code | Hard-coded data interpreted as code |
CWE-912 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-913 | C# | cs/code-injection | Improper control of generation of code |
CWE-913 | C# | cs/deserialized-delegate | Deserialized delegate |
CWE-913 | C# | cs/unsafe-deserialization | Unsafe deserializer |
CWE-913 | C# | cs/unsafe-deserialization-untrusted-input | Deserialization of untrusted data |
CWE-913 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-913 | Java/Kotlin | java/android/arbitrary-apk-installation | Android APK installation |
CWE-913 | Java/Kotlin | java/groovy-injection | Groovy Language injection |
CWE-913 | Java/Kotlin | java/insecure-bean-validation | Insecure Bean Validation |
CWE-913 | Java/Kotlin | java/jexl-expression-injection | Expression language injection (JEXL) |
CWE-913 | Java/Kotlin | java/mvel-expression-injection | Expression language injection (MVEL) |
CWE-913 | Java/Kotlin | java/spel-expression-injection | Expression language injection (Spring) |
CWE-913 | Java/Kotlin | java/server-side-template-injection | Server-side template injection |
CWE-913 | Java/Kotlin | java/android/fragment-injection | Android fragment injection |
CWE-913 | Java/Kotlin | java/android/fragment-injection-preference-activity | Android fragment injection in PreferenceActivity |
CWE-913 | Java/Kotlin | java/unsafe-deserialization | Deserialization of user-controlled data |
CWE-913 | Java/Kotlin | java/log4j-injection | Potential Log4J LDAP JNDI injection (CVE-2021-44228) |
CWE-913 | Java/Kotlin | java/beanshell-injection | BeanShell injection |
CWE-913 | Java/Kotlin | java/android-insecure-dex-loading | Insecure loading of an Android Dex File |
CWE-913 | Java/Kotlin | java/jshell-injection | JShell injection |
CWE-913 | Java/Kotlin | java/javaee-expression-injection | Jakarta Expression Language injection |
CWE-913 | Java/Kotlin | java/jython-injection | Injection in Jython |
CWE-913 | Java/Kotlin | java/unsafe-eval | Injection in Java Script Engine |
CWE-913 | Java/Kotlin | java/spring-view-manipulation-implicit | Spring Implicit View Manipulation |
CWE-913 | Java/Kotlin | java/spring-view-manipulation | Spring View Manipulation |
CWE-913 | Java/Kotlin | java/android/unsafe-reflection | Load 3rd party classes or code ('unsafe reflection') without signature check |
CWE-913 | Java/Kotlin | java/unsafe-reflection | Use of externally-controlled input to select classes or code ('unsafe reflection') |
CWE-913 | Java/Kotlin | java/unsafe-deserialization-rmi | Unsafe deserialization in a remotely callable method. |
CWE-913 | Java/Kotlin | java/unsafe-deserialization-spring-exporter-in-configuration-class | Unsafe deserialization with Spring's remote service exporters. |
CWE-913 | Java/Kotlin | java/unsafe-deserialization-spring-exporter-in-xml-configuration | Unsafe deserialization with Spring's remote service exporters. |
CWE-913 | JavaScript/TypeScript | js/enabling-electron-renderer-node-integration | Enabling Node.js integration for Electron web content renderers |
CWE-913 | JavaScript/TypeScript | js/template-object-injection | Template Object Injection |
CWE-913 | JavaScript/TypeScript | js/code-injection | Code injection |
CWE-913 | JavaScript/TypeScript | js/actions/command-injection | Expression injection in Actions |
CWE-913 | JavaScript/TypeScript | js/bad-code-sanitization | Improper code sanitization |
CWE-913 | JavaScript/TypeScript | js/unsafe-code-construction | Unsafe code constructed from library input |
CWE-913 | JavaScript/TypeScript | js/unsafe-dynamic-method-access | Unsafe dynamic method access |
CWE-913 | JavaScript/TypeScript | js/unsafe-deserialization | Deserialization of user-controlled data |
CWE-913 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-913 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-913 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-913 | JavaScript/TypeScript | js/code-injection-dynamic-import | Code injection |
CWE-913 | JavaScript/TypeScript | js/actions/pull-request-target | Checkout of untrusted code in trusted context |
CWE-913 | JavaScript/TypeScript | js/code-injection-more-sources | Code injection with additional heuristic sources |
CWE-913 | JavaScript/TypeScript | js/unsafe-deserialization-more-sources | Deserialization of user-controlled data with additional heuristic sources |
CWE-913 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-913 | Python | py/code-injection | Code injection |
CWE-913 | Python | py/unsafe-deserialization | Deserialization of user-controlled data |
CWE-913 | Python | py/js2py-rce | JavaScript code execution. |
CWE-913 | Ruby | rb/unsafe-unsafeyamldeserialization | Deserialization of user-controlled yaml data |
CWE-913 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-913 | Ruby | rb/code-injection | Code injection |
CWE-913 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-913 | Ruby | rb/unsafe-deserialization | Deserialization of user-controlled data |
CWE-913 | Ruby | rb/insecure-mass-assignment | Insecure Mass Assignment |
CWE-913 | Swift | swift/unsafe-webview-fetch | Unsafe WebView fetch |
CWE-913 | Swift | swift/unsafe-js-eval | JavaScript Injection |
CWE-915 | JavaScript/TypeScript | js/prototype-polluting-assignment | Prototype-polluting assignment |
CWE-915 | JavaScript/TypeScript | js/prototype-pollution-utility | Prototype-polluting function |
CWE-915 | JavaScript/TypeScript | js/prototype-pollution | Prototype-polluting merge call |
CWE-915 | JavaScript/TypeScript | js/prototype-polluting-assignment-more-sources | Prototype-polluting assignment with additional heuristic sources |
CWE-915 | Ruby | rb/insecure-mass-assignment | Insecure Mass Assignment |
CWE-916 | C# | cs/hash-without-salt | Use of a hash function without a salt |
CWE-916 | Java/Kotlin | java/hash-without-salt | Use of a hash function without a salt |
CWE-916 | JavaScript/TypeScript | js/insufficient-password-hash | Use of password hash with insufficient computational effort |
CWE-916 | Python | py/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-916 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-916 | Swift | swift/weak-password-hashing | Use of an inappropriate cryptographic hashing algorithm on passwords |
CWE-916 | Swift | swift/constant-salt | Use of constant salts |
CWE-916 | Swift | swift/insufficient-hash-iterations | Insufficient hash iterations |
CWE-917 | Java/Kotlin | java/ognl-injection | OGNL Expression Language statement with user-controlled input |
CWE-918 | C# | cs/request-forgery | Server-side request forgery |
CWE-918 | Go | go/request-forgery | Uncontrolled data used in network request |
CWE-918 | Go | go/ssrf | Uncontrolled data used in network request |
CWE-918 | Java/Kotlin | java/ssrf | Server-side request forgery |
CWE-918 | JavaScript/TypeScript | js/client-side-request-forgery | Client-side request forgery |
CWE-918 | JavaScript/TypeScript | js/request-forgery | Server-side request forgery |
CWE-918 | JavaScript/TypeScript | javascript/ssrf | Uncontrolled data used in network request |
CWE-918 | Python | py/full-ssrf | Full server-side request forgery |
CWE-918 | Python | py/partial-ssrf | Partial server-side request forgery |
CWE-918 | Ruby | rb/request-forgery | Server-side request forgery |
CWE-922 | C/C++ | cpp/cleartext-storage-buffer | Cleartext storage of sensitive information in buffer |
CWE-922 | C/C++ | cpp/cleartext-storage-file | Cleartext storage of sensitive information in file |
CWE-922 | C/C++ | cpp/cleartext-storage-database | Cleartext storage of sensitive information in an SQLite database |
CWE-922 | C# | cs/password-in-configuration | Password in configuration file |
CWE-922 | C# | cs/cleartext-storage-of-sensitive-information | Clear text storage of sensitive information |
CWE-922 | Go | go/clear-text-logging | Clear-text logging of sensitive information |
CWE-922 | Java/Kotlin | java/android/backup-enabled | Application backup allowed |
CWE-922 | Java/Kotlin | java/android/cleartext-storage-database | Cleartext storage of sensitive information using a local database on Android |
CWE-922 | Java/Kotlin | java/android/cleartext-storage-filesystem | Cleartext storage of sensitive information in the Android filesystem |
CWE-922 | Java/Kotlin | java/cleartext-storage-in-class | Cleartext storage of sensitive information using storable class |
CWE-922 | Java/Kotlin | java/cleartext-storage-in-cookie | Cleartext storage of sensitive information in cookie |
CWE-922 | Java/Kotlin | java/cleartext-storage-in-properties | Cleartext storage of sensitive information using 'Properties' class |
CWE-922 | Java/Kotlin | java/android/cleartext-storage-shared-prefs | Cleartext storage of sensitive information using SharedPreferences on Android |
CWE-922 | JavaScript/TypeScript | js/actions/actions-artifact-leak | Storage of sensitive information in GitHub Actions artifact |
CWE-922 | JavaScript/TypeScript | js/build-artifact-leak | Storage of sensitive information in build artifact |
CWE-922 | JavaScript/TypeScript | js/clear-text-logging | Clear-text logging of sensitive information |
CWE-922 | JavaScript/TypeScript | js/clear-text-storage-of-sensitive-data | Clear text storage of sensitive information |
CWE-922 | JavaScript/TypeScript | js/password-in-configuration-file | Password in configuration file |
CWE-922 | JavaScript/TypeScript | js/clear-text-cookie | Clear text transmission of sensitive cookie |
CWE-922 | Python | py/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-922 | Python | py/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-922 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-922 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-922 | Swift | swift/cleartext-storage-database | Cleartext storage of sensitive information in a local database |
CWE-922 | Swift | swift/cleartext-logging | Cleartext logging of sensitive information |
CWE-922 | Swift | swift/cleartext-storage-preferences | Cleartext storage of sensitive information in an application preference store |
CWE-923 | C# | cs/user-controlled-bypass | User-controlled bypass of sensitive method |
CWE-923 | Go | go/insecure-hostkeycallback | Use of insecure HostKeyCallback implementation |
CWE-923 | Go | go/sensitive-condition-bypass | User-controlled bypassing of sensitive action |
CWE-923 | Java/Kotlin | java/insecure-smtp-ssl | Insecure JavaMail SSL Configuration |
CWE-923 | Java/Kotlin | java/unsafe-hostname-verification | Unsafe hostname verification |
CWE-923 | Java/Kotlin | java/socket-auth-race-condition | Race condition in socket authentication |
CWE-923 | Java/Kotlin | java/maven/non-https-url | Failure to use HTTPS or SFTP URL in Maven artifact upload/download |
CWE-923 | Java/Kotlin | java/improper-intent-verification | Improper verification of intent by broadcast receiver |
CWE-923 | Java/Kotlin | java/android/intent-redirection | Android Intent redirection |
CWE-923 | Java/Kotlin | java/ignored-hostname-verification | Ignored result of hostname verification |
CWE-923 | Java/Kotlin | java/insecure-ldaps-endpoint | Insecure LDAPS Endpoint Configuration |
CWE-923 | JavaScript/TypeScript | js/missing-origin-check | Missing origin verification in postMessage handler |
CWE-923 | JavaScript/TypeScript | js/disabling-certificate-validation | Disabling certificate validation |
CWE-923 | JavaScript/TypeScript | js/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-923 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-925 | Java/Kotlin | java/improper-intent-verification | Improper verification of intent by broadcast receiver |
CWE-926 | Java/Kotlin | java/android/intent-uri-permission-manipulation | Intent URI permission manipulation |
CWE-926 | Java/Kotlin | java/android/incomplete-provider-permissions | Missing read or write permission in a content provider |
CWE-926 | Java/Kotlin | java/android/implicitly-exported-component | Implicitly exported Android component |
CWE-926 | Java/Kotlin | java/android/intent-redirection | Android Intent redirection |
CWE-927 | Java/Kotlin | java/android/implicit-pendingintents | Use of implicit PendingIntents |
CWE-927 | Java/Kotlin | java/android/sensitive-communication | Leaking sensitive information through an implicit Intent |
CWE-927 | Java/Kotlin | java/android/sensitive-result-receiver | Leaking sensitive information through a ResultReceiver |
CWE-939 | Java/Kotlin | java/incorrect-url-verification | Incorrect URL verification |
CWE-940 | Java/Kotlin | java/android/intent-redirection | Android Intent redirection |
CWE-940 | JavaScript/TypeScript | js/missing-origin-check | Missing origin verification in postMessage handler |
CWE-942 | Go | go/cors-misconfiguration | CORS misconfiguration |
CWE-942 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials | CORS misconfiguration for credentials transfer |
CWE-942 | JavaScript/TypeScript | js/cors-misconfiguration | overly CORS configuration |
CWE-942 | JavaScript/TypeScript | js/cors-misconfiguration-for-credentials-more-sources | CORS misconfiguration for credentials transfer with additional heuristic sources |
CWE-942 | Python | py/cors-misconfiguration-with-credentials | Cors misconfiguration with credentials |
CWE-943 | C/C++ | cpp/sql-injection | Uncontrolled data in SQL query |
CWE-943 | C# | cs/sql-injection | SQL query built from user-controlled sources |
CWE-943 | C# | cs/ldap-injection | LDAP query built from user-controlled sources |
CWE-943 | C# | cs/xml/xpath-injection | XPath injection |
CWE-943 | Go | go/sql-injection | Database query built from user-controlled sources |
CWE-943 | Go | go/unsafe-quoting | Potentially unsafe quoting |
CWE-943 | Go | go/xml/xpath-injection | XPath injection |
CWE-943 | Go | go/ldap-injection | LDAP query built from user-controlled sources |
CWE-943 | Java/Kotlin | java/concatenated-sql-query | Query built by concatenation with a possibly-untrusted string |
CWE-943 | Java/Kotlin | java/sql-injection | Query built from user-controlled sources |
CWE-943 | Java/Kotlin | java/ldap-injection | LDAP query built from user-controlled sources |
CWE-943 | Java/Kotlin | java/xml/xpath-injection | XPath injection |
CWE-943 | Java/Kotlin | java/mybatis-annotation-sql-injection | SQL injection in MyBatis annotation |
CWE-943 | Java/Kotlin | java/mybatis-xml-sql-injection | SQL injection in MyBatis Mapper XML |
CWE-943 | Java/Kotlin | java/xquery-injection | XQuery query built from user-controlled sources |
CWE-943 | JavaScript/TypeScript | js/sql-injection | Database query built from user-controlled sources |
CWE-943 | JavaScript/TypeScript | js/xpath-injection | XPath injection |
CWE-943 | JavaScript/TypeScript | js/env-key-and-value-injection | User controlled arbitrary environment variable injection |
CWE-943 | JavaScript/TypeScript | js/env-value-injection | User controlled environment variable value injection |
CWE-943 | JavaScript/TypeScript | js/sql-injection-more-sources | Database query built from user-controlled sources with additional heuristic sources |
CWE-943 | JavaScript/TypeScript | js/xpath-injection-more-sources | XPath injection with additional heuristic sources |
CWE-943 | Python | py/sql-injection | SQL query built from user-controlled sources |
CWE-943 | Python | py/ldap-injection | LDAP query built from user-controlled sources |
CWE-943 | Python | py/xpath-injection | XPath query built from user-controlled sources |
CWE-943 | Python | py/nosql-injection | NoSQL Injection |
CWE-943 | Python | py/xslt-injection | XSLT query built from user-controlled sources |
CWE-943 | Ruby | rb/ldap-injection | LDAP Injection |
CWE-943 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-943 | Ruby | rb/sql-injection | SQL query built from user-controlled sources |
CWE-943 | Swift | swift/sql-injection | Database query built from user-controlled sources |
CWE-943 | Swift | swift/predicate-injection | Predicate built from user-controlled sources |
CWE-1004 | C# | cs/web/cookie-httponly-not-set | 'HttpOnly' attribute is not set to true |
CWE-1004 | Go | go/cookie-httponly-not-set | 'HttpOnly' attribute is not set to true |
CWE-1004 | Java/Kotlin | java/tomcat-disabled-httponly | Tomcat config disables 'HttpOnly' flag (XSS risk) |
CWE-1004 | Java/Kotlin | java/sensitive-cookie-not-httponly | Sensitive cookies without the HttpOnly response header set |
CWE-1004 | JavaScript/TypeScript | js/client-exposed-cookie | Sensitive server cookie exposed to the client |
CWE-1004 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-1021 | JavaScript/TypeScript | js/insecure-helmet-configuration | Insecure configuration of Helmet security middleware |
CWE-1022 | JavaScript/TypeScript | js/unsafe-external-link | Potentially unsafe external link |
CWE-1041 | C/C++ | cpp/call-to-function-without-wrapper | Missed opportunity to call wrapper function |
CWE-1078 | C/C++ | cpp/comma-before-misleading-indentation | Comma before misleading indentation |
CWE-1104 | Java/Kotlin | java/maven/dependency-upon-bintray | Depending upon JCenter/Bintray as an artifact repository |
CWE-1126 | C/C++ | cpp/errors-when-using-variable-declaration-inside-loop | Errors When Using Variable Declaration Inside Loop |
CWE-1176 | JavaScript/TypeScript | js/angular/double-compilation | Double compilation |
CWE-1204 | Java/Kotlin | java/static-initialization-vector | Using a static initialization vector for encryption |
CWE-1204 | Swift | swift/static-initialization-vector | Static initialization vector for encryption |
CWE-1236 | Python | py/csv-injection | Csv Injection |
CWE-1240 | C/C++ | cpp/crypto-primitive | Implementation of a cryptographic primitive |
CWE-1275 | JavaScript/TypeScript | js/samesite-none-cookie | Sensitive cookie without SameSite restrictions |
CWE-1275 | Python | py/insecure-cookie | Failure to use secure cookies |
CWE-1275 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-1333 | C# | cs/redos | Denial of Service from comparison of user input against expensive regex |
CWE-1333 | Java/Kotlin | java/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-1333 | Java/Kotlin | java/redos | Inefficient regular expression |
CWE-1333 | JavaScript/TypeScript | js/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-1333 | JavaScript/TypeScript | js/redos | Inefficient regular expression |
CWE-1333 | Python | py/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-1333 | Python | py/redos | Inefficient regular expression |
CWE-1333 | Ruby | rb/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-1333 | Ruby | rb/redos | Inefficient regular expression |
CWE-1333 | Ruby | rb/regexp-injection | Regular expression injection |
CWE-1333 | Swift | swift/redos | Inefficient regular expression |
CWE-1336 | Java/Kotlin | java/server-side-template-injection | Server-side template injection |