CWE coverage for Ruby¶
An overview of CWE coverage for Ruby in the latest release of CodeQL.
Overview¶
CWE | Language | Query id | Query name |
---|---|---|---|
CWE-20 | Ruby | rb/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-20 | Ruby | rb/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-20 | Ruby | rb/regex/badly-anchored-regexp | Badly anchored regular expression |
CWE-20 | Ruby | rb/regex/missing-regexp-anchor | Missing regular expression anchor |
CWE-20 | Ruby | rb/overly-large-range | Overly permissive regular expression range |
CWE-20 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-20 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-20 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-22 | Ruby | rb/zip-slip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-22 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-23 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-36 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-73 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-73 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-73 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-73 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-74 | Ruby | rb/ldap-injection | LDAP Injection |
CWE-74 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-74 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-74 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-74 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-74 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-74 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-74 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-74 | Ruby | rb/reflected-xss | Reflected server-side cross-site scripting |
CWE-74 | Ruby | rb/stored-xss | Stored cross-site scripting |
CWE-74 | Ruby | rb/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-74 | Ruby | rb/sql-injection | SQL query built from user-controlled sources |
CWE-74 | Ruby | rb/code-injection | Code injection |
CWE-74 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-74 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-74 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-74 | Ruby | rb/tainted-format-string | Use of externally-controlled format string |
CWE-77 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-77 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-77 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-77 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-78 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-78 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-78 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-78 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-79 | Ruby | rb/reflected-xss | Reflected server-side cross-site scripting |
CWE-79 | Ruby | rb/stored-xss | Stored cross-site scripting |
CWE-79 | Ruby | rb/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-79 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-79 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-79 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-80 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-80 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-88 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-88 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-88 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-88 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-89 | Ruby | rb/sql-injection | SQL query built from user-controlled sources |
CWE-90 | Ruby | rb/ldap-injection | LDAP Injection |
CWE-91 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-94 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-94 | Ruby | rb/code-injection | Code injection |
CWE-94 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-95 | Ruby | rb/code-injection | Code injection |
CWE-99 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-116 | Ruby | rb/reflected-xss | Reflected server-side cross-site scripting |
CWE-116 | Ruby | rb/stored-xss | Stored cross-site scripting |
CWE-116 | Ruby | rb/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-116 | Ruby | rb/code-injection | Code injection |
CWE-116 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-116 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-116 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-116 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-116 | Ruby | rb/log-injection | Log injection |
CWE-117 | Ruby | rb/log-injection | Log injection |
CWE-134 | Ruby | rb/tainted-format-string | Use of externally-controlled format string |
CWE-172 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-176 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-179 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-180 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-185 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-186 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-200 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-200 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-200 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-200 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-200 | Ruby | rb/sensitive-get-query | Sensitive data read from GET request |
CWE-203 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-208 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-209 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-259 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-284 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-284 | Ruby | rb/improper-ldap-auth | Improper LDAP Authentication |
CWE-284 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-284 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-284 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-284 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-285 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-285 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-287 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-287 | Ruby | rb/improper-ldap-auth | Improper LDAP Authentication |
CWE-287 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-290 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-295 | Ruby | rb/request-without-cert-validation | Request without certificate validation |
CWE-300 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-311 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-311 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-311 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-312 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-312 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-319 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-321 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-326 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-327 | Ruby | rb/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-327 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-328 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-330 | Ruby | rb/insecure-randomness | Insecure randomness |
CWE-330 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-338 | Ruby | rb/insecure-randomness | Insecure randomness |
CWE-344 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-345 | Ruby | rb/jwt-missing-verification | JWT missing secret or public key verification |
CWE-345 | Ruby | rb/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-345 | Ruby | rb/csrf-protection-not-enabled | CSRF protection not enabled |
CWE-347 | Ruby | rb/jwt-missing-verification | JWT missing secret or public key verification |
CWE-352 | Ruby | rb/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-352 | Ruby | rb/csrf-protection-not-enabled | CSRF protection not enabled |
CWE-359 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-359 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-398 | Ruby | rb/useless-assignment-to-local | Useless assignment to local variable |
CWE-398 | Ruby | rb/unused-parameter | Unused parameter. |
CWE-400 | Ruby | rb/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-400 | Ruby | rb/redos | Inefficient regular expression |
CWE-400 | Ruby | rb/regexp-injection | Regular expression injection |
CWE-405 | Ruby | rb/user-controlled-data-decompression | User-controlled file decompression |
CWE-405 | Ruby | rb/user-controlled-file-decompression | User-controlled file decompression |
CWE-405 | Ruby | rb/xxe | XML external entity expansion |
CWE-409 | Ruby | rb/user-controlled-data-decompression | User-controlled file decompression |
CWE-409 | Ruby | rb/user-controlled-file-decompression | User-controlled file decompression |
CWE-409 | Ruby | rb/xxe | XML external entity expansion |
CWE-434 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-441 | Ruby | rb/request-forgery | Server-side request forgery |
CWE-494 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-497 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-502 | Ruby | rb/unsafe-unsafeyamldeserialization | Deserialization of user-controlled yaml data |
CWE-502 | Ruby | rb/unsafe-deserialization | Deserialization of user-controlled data |
CWE-506 | Ruby | rb/hardcoded-data-interpreted-as-code | Hard-coded data interpreted as code |
CWE-532 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-532 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-538 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-538 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-552 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-552 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-563 | Ruby | rb/useless-assignment-to-local | Useless assignment to local variable |
CWE-563 | Ruby | rb/unused-parameter | Unused parameter. |
CWE-592 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-598 | Ruby | rb/sensitive-get-query | Sensitive data read from GET request |
CWE-601 | Ruby | rb/url-redirection | URL redirection from remote source |
CWE-610 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-610 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-610 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-610 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-610 | Ruby | rb/url-redirection | URL redirection from remote source |
CWE-610 | Ruby | rb/xxe | XML external entity expansion |
CWE-610 | Ruby | rb/request-forgery | Server-side request forgery |
CWE-611 | Ruby | rb/xxe | XML external entity expansion |
CWE-642 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-642 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-642 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-642 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-643 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-657 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-664 | Ruby | rb/user-controlled-data-decompression | User-controlled file decompression |
CWE-664 | Ruby | rb/zip-slip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-664 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-664 | Ruby | rb/unsafe-unsafeyamldeserialization | Deserialization of user-controlled yaml data |
CWE-664 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-664 | Ruby | rb/user-controlled-file-decompression | User-controlled file decompression |
CWE-664 | Ruby | rb/improper-ldap-auth | Improper LDAP Authentication |
CWE-664 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-664 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-664 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-664 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-664 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-664 | Ruby | rb/code-injection | Code injection |
CWE-664 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-664 | Ruby | rb/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-664 | Ruby | rb/redos | Inefficient regular expression |
CWE-664 | Ruby | rb/regexp-injection | Regular expression injection |
CWE-664 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-664 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-664 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-664 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-664 | Ruby | rb/unsafe-deserialization | Deserialization of user-controlled data |
CWE-664 | Ruby | rb/sensitive-get-query | Sensitive data read from GET request |
CWE-664 | Ruby | rb/url-redirection | URL redirection from remote source |
CWE-664 | Ruby | rb/xxe | XML external entity expansion |
CWE-664 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-664 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-664 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-664 | Ruby | rb/insecure-download | Download of sensitive file through insecure connection |
CWE-664 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-664 | Ruby | rb/insecure-mass-assignment | Insecure Mass Assignment |
CWE-664 | Ruby | rb/request-forgery | Server-side request forgery |
CWE-668 | Ruby | rb/zip-slip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-668 | Ruby | rb/unsafe-hmac-comparison | Unsafe HMAC Comparison |
CWE-668 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-668 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-668 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-668 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-668 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-668 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-668 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-668 | Ruby | rb/sensitive-get-query | Sensitive data read from GET request |
CWE-668 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-668 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-669 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-669 | Ruby | rb/xxe | XML external entity expansion |
CWE-669 | Ruby | rb/insecure-download | Download of sensitive file through insecure connection |
CWE-669 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-671 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-674 | Ruby | rb/xxe | XML external entity expansion |
CWE-691 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-691 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-691 | Ruby | rb/code-injection | Code injection |
CWE-691 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-691 | Ruby | rb/xxe | XML external entity expansion |
CWE-693 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-693 | Ruby | rb/jwt-missing-verification | JWT missing secret or public key verification |
CWE-693 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-693 | Ruby | rb/improper-ldap-auth | Improper LDAP Authentication |
CWE-693 | Ruby | rb/incomplete-hostname-regexp | Incomplete regular expression for hostnames |
CWE-693 | Ruby | rb/incomplete-url-substring-sanitization | Incomplete URL substring sanitization |
CWE-693 | Ruby | rb/regex/badly-anchored-regexp | Badly anchored regular expression |
CWE-693 | Ruby | rb/regex/missing-regexp-anchor | Missing regular expression anchor |
CWE-693 | Ruby | rb/overly-large-range | Overly permissive regular expression range |
CWE-693 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-693 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-693 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-693 | Ruby | rb/request-without-cert-validation | Request without certificate validation |
CWE-693 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-693 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-693 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-693 | Ruby | rb/weak-cryptographic-algorithm | Use of a broken or weak cryptographic algorithm |
CWE-693 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-693 | Ruby | rb/csrf-protection-disabled | CSRF protection weakened or disabled |
CWE-693 | Ruby | rb/csrf-protection-not-enabled | CSRF protection not enabled |
CWE-693 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-693 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-693 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-696 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-697 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-703 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-706 | Ruby | rb/zip-slip | Arbitrary file access during archive extraction ("Zip Slip") |
CWE-706 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-706 | Ruby | rb/xxe | XML external entity expansion |
CWE-707 | Ruby | rb/unicode-bypass-validation | Bypass Logical Validation Using Unicode Characters |
CWE-707 | Ruby | rb/ldap-injection | LDAP Injection |
CWE-707 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-707 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-707 | Ruby | rb/path-injection | Uncontrolled data used in path expression |
CWE-707 | Ruby | rb/command-line-injection | Uncontrolled command line |
CWE-707 | Ruby | rb/kernel-open | Use of Kernel.open , IO.read or similar sinks with user-controlled input |
CWE-707 | Ruby | rb/non-constant-kernel-open | Use of Kernel.open or IO.read or similar sinks with a non-constant value |
CWE-707 | Ruby | rb/shell-command-constructed-from-input | Unsafe shell command constructed from library input |
CWE-707 | Ruby | rb/reflected-xss | Reflected server-side cross-site scripting |
CWE-707 | Ruby | rb/stored-xss | Stored cross-site scripting |
CWE-707 | Ruby | rb/html-constructed-from-input | Unsafe HTML constructed from library input |
CWE-707 | Ruby | rb/sql-injection | SQL query built from user-controlled sources |
CWE-707 | Ruby | rb/code-injection | Code injection |
CWE-707 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-707 | Ruby | rb/bad-tag-filter | Bad HTML filtering regexp |
CWE-707 | Ruby | rb/incomplete-multi-character-sanitization | Incomplete multi-character sanitization |
CWE-707 | Ruby | rb/incomplete-sanitization | Incomplete string escaping or encoding |
CWE-707 | Ruby | rb/log-injection | Log injection |
CWE-707 | Ruby | rb/tainted-format-string | Use of externally-controlled format string |
CWE-710 | Ruby | rb/hardcoded-data-interpreted-as-code | Hard-coded data interpreted as code |
CWE-710 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-710 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-710 | Ruby | rb/useless-assignment-to-local | Useless assignment to local variable |
CWE-710 | Ruby | rb/unused-parameter | Unused parameter. |
CWE-732 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-732 | Ruby | rb/overly-permissive-file | Overly permissive file permissions |
CWE-755 | Ruby | rb/stack-trace-exposure | Information exposure through an exception |
CWE-776 | Ruby | rb/xxe | XML external entity expansion |
CWE-798 | Ruby | rb/hardcoded-credentials | Hard-coded credentials |
CWE-807 | Ruby | rb/user-controlled-bypass | User-controlled bypass of security check |
CWE-827 | Ruby | rb/xxe | XML external entity expansion |
CWE-829 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-829 | Ruby | rb/xxe | XML external entity expansion |
CWE-829 | Ruby | rb/insecure-download | Download of sensitive file through insecure connection |
CWE-834 | Ruby | rb/xxe | XML external entity expansion |
CWE-912 | Ruby | rb/hardcoded-data-interpreted-as-code | Hard-coded data interpreted as code |
CWE-912 | Ruby | rb/http-to-file-access | Network data written to file |
CWE-913 | Ruby | rb/unsafe-unsafeyamldeserialization | Deserialization of user-controlled yaml data |
CWE-913 | Ruby | rb/server-side-template-injection | Server-side template injection |
CWE-913 | Ruby | rb/code-injection | Code injection |
CWE-913 | Ruby | rb/unsafe-code-construction | Unsafe code constructed from library input |
CWE-913 | Ruby | rb/unsafe-deserialization | Deserialization of user-controlled data |
CWE-913 | Ruby | rb/insecure-mass-assignment | Insecure Mass Assignment |
CWE-915 | Ruby | rb/insecure-mass-assignment | Insecure Mass Assignment |
CWE-916 | Ruby | rb/weak-sensitive-data-hashing | Use of a broken or weak cryptographic hashing algorithm on sensitive data |
CWE-918 | Ruby | rb/request-forgery | Server-side request forgery |
CWE-922 | Ruby | rb/clear-text-logging-sensitive-data | Clear-text logging of sensitive information |
CWE-922 | Ruby | rb/clear-text-storage-sensitive-data | Clear-text storage of sensitive information |
CWE-923 | Ruby | rb/insecure-dependency | Dependency download using unencrypted communication channel |
CWE-943 | Ruby | rb/ldap-injection | LDAP Injection |
CWE-943 | Ruby | rb/xpath-injection | XPath query built from user-controlled sources |
CWE-943 | Ruby | rb/sql-injection | SQL query built from user-controlled sources |
CWE-1275 | Ruby | rb/weak-cookie-configuration | Weak cookie configuration |
CWE-1333 | Ruby | rb/polynomial-redos | Polynomial regular expression used on uncontrolled data |
CWE-1333 | Ruby | rb/redos | Inefficient regular expression |
CWE-1333 | Ruby | rb/regexp-injection | Regular expression injection |