CodeQL full CWE coverage — CodeQL query help documentation
CWE-11
C#
cs/web/debug-binary
Creating an ASP.NET debug binary may reveal sensitive information
CWE-12
C#
cs/web/missing-global-error-handler
Missing global error handler
CWE-13
C#
cs/password-in-configuration
Password in configuration file
CWE-14
C/C++
cpp/memset-may-be-deleted
Call to
memset may be deleted
CWE-20
GitHub Actions
actions/composite-action-sinks
Composite Action Sinks
CWE-20
GitHub Actions
actions/composite-action-sources
Composite Action Sources
CWE-20
GitHub Actions
actions/composite-action-summaries
Composite Action Summaries
CWE-20
GitHub Actions
actions/reusable-workflow-sinks
Reusable Workflow Sinks
CWE-20
GitHub Actions
actions/reusable-workflow-sources
Reusable Workflow Sources
CWE-20
GitHub Actions
actions/reusable-workflow-summaries
Reusable Workflows Summaries
CWE-20
GitHub Actions
actions/envpath-injection/critical
PATH environment variable built from user-controlled sources
CWE-20
GitHub Actions
actions/envpath-injection/medium
PATH environment variable built from user-controlled sources
CWE-20
GitHub Actions
actions/envvar-injection/critical
Environment variable built from user-controlled sources
CWE-20
GitHub Actions
actions/envvar-injection/medium
Environment variable built from user-controlled sources
CWE-20
C/C++
cpp/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-20
C/C++
cpp/count-untrusted-data-external-api-ir
Frequency counts for external APIs that are used with untrusted data
CWE-20
C/C++
cpp/untrusted-data-to-external-api-ir
Untrusted data passed to external API
CWE-20
C/C++
cpp/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-20
C/C++
cpp/uncontrolled-process-operation
Uncontrolled process operation
CWE-20
C/C++
cpp/unclear-array-index-validation
Unclear validation of array index
CWE-20
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-20
C/C++
cpp/late-check-of-function-argument
Late Check Of Function Argument
CWE-20
C/C++
cpp/linux-kernel-no-check-before-unsafe-put-user
Linux kernel no check before unsafe_put_user vulnerability detection
CWE-20
C#
cs/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-20
C#
cs/serialization-check-bypass
Serialization check bypass
CWE-20
C#
cs/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-20
C#
cs/xml/missing-validation
Missing XML validation
CWE-20
C#
cs/assembly-path-injection
Assembly path injection
CWE-20
Go
go/constant-length-comparison
Constant length comparison
CWE-20
Go
go/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-20
Go
go/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-20
Go
go/incomplete-url-scheme-check
Incomplete URL scheme check
CWE-20
Go
go/regex/missing-regexp-anchor
Missing regular expression anchor
CWE-20
Go
go/suspicious-character-in-regex
Suspicious characters in a regular expression
CWE-20
Go
go/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-20
Go
go/untrusted-data-to-unknown-external-api
Untrusted data passed to unknown external API
CWE-20
Java/Kotlin
java/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-20
Java/Kotlin
java/overly-large-range
Overly permissive regular expression range
CWE-20
Java/Kotlin
java/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-20
Java/Kotlin
java/improper-validation-of-array-construction
Improper validation of user-provided size used for array construction
CWE-20
Java/Kotlin
java/improper-validation-of-array-construction-code-specified
Improper validation of code-specified size used for array construction
CWE-20
Java/Kotlin
java/improper-validation-of-array-index
Improper validation of user-provided array index
CWE-20
Java/Kotlin
java/improper-validation-of-array-index-code-specified
Improper validation of code-specified array index
CWE-20
Java/Kotlin
java/log4j-injection
Potential Log4J LDAP JNDI injection (CVE-2021-44228)
CWE-20
JavaScript/TypeScript
js/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-20
JavaScript/TypeScript
js/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-20
JavaScript/TypeScript
js/incomplete-url-scheme-check
Incomplete URL scheme check
CWE-20
JavaScript/TypeScript
js/incomplete-url-substring-sanitization
Incomplete URL substring sanitization
CWE-20
JavaScript/TypeScript
js/incorrect-suffix-check
Incorrect suffix check
CWE-20
JavaScript/TypeScript
js/missing-origin-check
Missing origin verification in postMessage handler
CWE-20
JavaScript/TypeScript
js/regex/missing-regexp-anchor
Missing regular expression anchor
CWE-20
JavaScript/TypeScript
js/overly-large-range
Overly permissive regular expression range
CWE-20
JavaScript/TypeScript
js/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-20
JavaScript/TypeScript
js/useless-regexp-character-escape
Useless regular-expression character escape
CWE-20
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-20
JavaScript/TypeScript
js/double-escaping
Double escaping or unescaping
CWE-20
JavaScript/TypeScript
js/incomplete-html-attribute-sanitization
Incomplete HTML attribute sanitization
CWE-20
JavaScript/TypeScript
js/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-20
JavaScript/TypeScript
js/incomplete-sanitization
Incomplete string escaping or encoding
CWE-20
JavaScript/TypeScript
js/untrusted-data-to-external-api-more-sources
Untrusted data passed to external API with additional heuristic sources
CWE-20
Python
py/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-20
Python
py/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-20
Python
py/cookie-injection
Construction of a cookie using user-supplied input
CWE-20
Python
py/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-20
Python
py/incomplete-url-substring-sanitization
Incomplete URL substring sanitization
CWE-20
Python
py/overly-large-range
Overly permissive regular expression range
CWE-20
Python
py/bad-tag-filter
Bad HTML filtering regexp
CWE-20
Ruby
rb/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-20
Ruby
rb/incomplete-url-substring-sanitization
Incomplete URL substring sanitization
CWE-20
Ruby
rb/regex/badly-anchored-regexp
Badly anchored regular expression
CWE-20
Ruby
rb/regex/missing-regexp-anchor
Missing regular expression anchor
CWE-20
Ruby
rb/overly-large-range
Overly permissive regular expression range
CWE-20
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-20
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-20
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-20
Rust
rust/regex-injection
Regular expression injection
CWE-20
Rust
rust/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-20
Swift
swift/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-20
Swift
swift/missing-regexp-anchor
Missing regular expression anchor
CWE-20
Swift
swift/bad-tag-filter
Bad HTML filtering regexp
CWE-22
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-22
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-22
C#
cs/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-22
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-22
Go
go/path-injection
Uncontrolled data used in path expression
CWE-22
Go
go/unsafe-unzip-symlink
Arbitrary file write extracting an archive containing symbolic links
CWE-22
Go
go/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-22
Java/Kotlin
java/path-injection
Uncontrolled data used in path expression
CWE-22
Java/Kotlin
java/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-22
Java/Kotlin
java/partial-path-traversal
Partial path traversal vulnerability
CWE-22
Java/Kotlin
java/partial-path-traversal-from-remote
Partial path traversal vulnerability from remote
CWE-22
Java/Kotlin
java/openstream-called-on-tainted-url
openStream called on URLs created from remote source
CWE-22
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-22
JavaScript/TypeScript
js/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-22
Python
py/path-injection
Uncontrolled data used in path expression
CWE-22
Python
py/tarslip
Arbitrary file write during tarfile extraction
CWE-22
Python
py/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-22
Python
py/tarslip-extended
Arbitrary file write during tarfile extraction
CWE-22
Python
py/unsafe-unpacking
Arbitrary file write during a tarball extraction from a user controlled source
CWE-22
Ruby
rb/zip-slip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-22
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-22
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-22
Swift
swift/unsafe-unpacking
Arbitrary file write during a zip extraction from a user controlled source
CWE-22
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-23
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-23
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-23
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-23
Go
go/path-injection
Uncontrolled data used in path expression
CWE-23
Java/Kotlin
java/path-injection
Uncontrolled data used in path expression
CWE-23
Java/Kotlin
java/partial-path-traversal
Partial path traversal vulnerability
CWE-23
Java/Kotlin
java/partial-path-traversal-from-remote
Partial path traversal vulnerability from remote
CWE-23
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-23
Python
py/path-injection
Uncontrolled data used in path expression
CWE-23
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-23
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-23
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-36
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-36
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-36
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-36
Go
go/path-injection
Uncontrolled data used in path expression
CWE-36
Java/Kotlin
java/path-injection
Uncontrolled data used in path expression
CWE-36
Java/Kotlin
java/openstream-called-on-tainted-url
openStream called on URLs created from remote source
CWE-36
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-36
Python
py/path-injection
Uncontrolled data used in path expression
CWE-36
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-36
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-36
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-73
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-73
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-73
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-73
Go
go/path-injection
Uncontrolled data used in path expression
CWE-73
Java/Kotlin
java/path-injection
Uncontrolled data used in path expression
CWE-73
Java/Kotlin
java/file-path-injection
File Path Injection
CWE-73
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-73
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-73
Python
py/path-injection
Uncontrolled data used in path expression
CWE-73
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-73
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-73
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-73
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-73
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-73
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-73
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-74
GitHub Actions
actions/envpath-injection/critical
PATH environment variable built from user-controlled sources
CWE-74
GitHub Actions
actions/envpath-injection/medium
PATH environment variable built from user-controlled sources
CWE-74
GitHub Actions
actions/envvar-injection/critical
Environment variable built from user-controlled sources
CWE-74
GitHub Actions
actions/envvar-injection/medium
Environment variable built from user-controlled sources
CWE-74
GitHub Actions
actions/code-injection/critical
Code injection
CWE-74
GitHub Actions
actions/code-injection/medium
Code injection
CWE-74
GitHub Actions
actions/cache-poisoning/code-injection
Cache Poisoning via low-privileged code injection
CWE-74
GitHub Actions
actions/output-clobbering/high
Output Clobbering
CWE-74
GitHub Actions
actions/command-injection/critical
Command built from user-controlled sources
CWE-74
GitHub Actions
actions/command-injection/medium
Command built from user-controlled sources
CWE-74
GitHub Actions
actions/argument-injection/critical
Argument injection
CWE-74
GitHub Actions
actions/argument-injection/medium
Argument injection
CWE-74
C/C++
cpp/non-constant-format
Non-constant format string
CWE-74
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-74
C/C++
cpp/cgi-xss
CGI script vulnerable to cross-site scripting
CWE-74
C/C++
cpp/sql-injection
Uncontrolled data in SQL query
CWE-74
C/C++
cpp/tainted-format-string
Uncontrolled format string
CWE-74
C/C++
cpp/wordexp-injection
Uncontrolled data used in wordexp command
CWE-74
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-74
C#
cs/command-line-injection
Uncontrolled command line
CWE-74
C#
cs/web/xss
Cross-site scripting
CWE-74
C#
cs/sql-injection
SQL query built from user-controlled sources
CWE-74
C#
cs/ldap-injection
LDAP query built from user-controlled sources
CWE-74
C#
cs/xml-injection
XML injection
CWE-74
C#
cs/code-injection
Improper control of generation of code
CWE-74
C#
cs/resource-injection
Resource injection
CWE-74
C#
cs/uncontrolled-format-string
Uncontrolled format string
CWE-74
C#
cs/xml/xpath-injection
XPath injection
CWE-74
C#
cs/web/disabled-header-checking
Header checking disabled
CWE-74
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-74
Go
go/path-injection
Uncontrolled data used in path expression
CWE-74
Go
go/command-injection
Command built from user-controlled sources
CWE-74
Go
go/stored-command
Command built from stored data
CWE-74
Go
go/html-template-escaping-bypass-xss
Cross-site scripting via HTML template escaping bypass
CWE-74
Go
go/reflected-xss
Reflected cross-site scripting
CWE-74
Go
go/stored-xss
Stored cross-site scripting
CWE-74
Go
go/sql-injection
Database query built from user-controlled sources
CWE-74
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-74
Go
go/xml/xpath-injection
XPath injection
CWE-74
Go
go/ldap-injection
LDAP query built from user-controlled sources
CWE-74
Go
go/dsn-injection
SQL Data-source URI built from user-controlled sources
CWE-74
Go
go/dsn-injection-local
SQL Data-source URI built from local user-controlled sources
CWE-74
Java/Kotlin
java/jndi-injection
JNDI lookup with user-controlled name
CWE-74
Java/Kotlin
java/xslt-injection
XSLT transformation with user-controlled stylesheet
CWE-74
Java/Kotlin
java/relative-path-command
Executing a command with a relative path
CWE-74
Java/Kotlin
java/command-line-injection
Uncontrolled command line
CWE-74
Java/Kotlin
java/exec-tainted-environment
Building a command with an injected environment variable
CWE-74
Java/Kotlin
java/concatenated-command-line
Building a command line with string concatenation
CWE-74
Java/Kotlin
java/android/webview-addjavascriptinterface
Access Java object methods through JavaScript exposure
CWE-74
Java/Kotlin
java/android/websettings-javascript-enabled
Android WebView JavaScript settings
CWE-74
Java/Kotlin
java/xss
Cross-site scripting
CWE-74
Java/Kotlin
java/concatenated-sql-query
Query built by concatenation with a possibly-untrusted string
CWE-74
Java/Kotlin
java/sql-injection
Query built from user-controlled sources
CWE-74
Java/Kotlin
java/ldap-injection
LDAP query built from user-controlled sources
CWE-74
Java/Kotlin
java/android/arbitrary-apk-installation
Android APK installation
CWE-74
Java/Kotlin
java/groovy-injection
Groovy Language injection
CWE-74
Java/Kotlin
java/insecure-bean-validation
Insecure Bean Validation
CWE-74
Java/Kotlin
java/jexl-expression-injection
Expression language injection (JEXL)
CWE-74
Java/Kotlin
java/mvel-expression-injection
Expression language injection (MVEL)
CWE-74
Java/Kotlin
java/spel-expression-injection
Expression language injection (Spring)
CWE-74
Java/Kotlin
java/server-side-template-injection
Server-side template injection
CWE-74
Java/Kotlin
java/netty-http-request-or-response-splitting
Disabled Netty HTTP header validation
CWE-74
Java/Kotlin
java/http-response-splitting
HTTP response splitting
CWE-74
Java/Kotlin
java/tainted-format-string
Use of externally-controlled format string
CWE-74
Java/Kotlin
java/xml/xpath-injection
XPath injection
CWE-74
Java/Kotlin
java/android/unsafe-android-webview-fetch
Unsafe resource fetching in Android WebView
CWE-74
Java/Kotlin
java/ognl-injection
OGNL Expression Language statement with user-controlled input
CWE-74
Java/Kotlin
java/log4j-injection
Potential Log4J LDAP JNDI injection (CVE-2021-44228)
CWE-74
Java/Kotlin
java/command-line-injection-extra
Command Injection into Runtime.exec() with dangerous command
CWE-74
Java/Kotlin
java/command-line-injection-extra-local
Command Injection into Runtime.exec() with dangerous command
CWE-74
Java/Kotlin
java/command-line-injection-experimental
Uncontrolled command line (experimental sinks)
CWE-74
Java/Kotlin
java/mybatis-annotation-sql-injection
SQL injection in MyBatis annotation
CWE-74
Java/Kotlin
java/mybatis-xml-sql-injection
SQL injection in MyBatis Mapper XML
CWE-74
Java/Kotlin
java/beanshell-injection
BeanShell injection
CWE-74
Java/Kotlin
java/android-insecure-dex-loading
Insecure loading of an Android Dex File
CWE-74
Java/Kotlin
java/jshell-injection
JShell injection
CWE-74
Java/Kotlin
java/javaee-expression-injection
Jakarta Expression Language injection
CWE-74
Java/Kotlin
java/jython-injection
Injection in Jython
CWE-74
Java/Kotlin
java/unsafe-eval
Injection in Java Script Engine
CWE-74
Java/Kotlin
java/spring-view-manipulation-implicit
Spring Implicit View Manipulation
CWE-74
Java/Kotlin
java/spring-view-manipulation
Spring View Manipulation
CWE-74
Java/Kotlin
java/xquery-injection
XQuery query built from user-controlled sources
CWE-74
JavaScript/TypeScript
js/disabling-electron-websecurity
Disabling Electron webSecurity
CWE-74
JavaScript/TypeScript
js/enabling-electron-renderer-node-integration
Enabling Node.js integration for Electron web content renderers
CWE-74
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-74
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-74
JavaScript/TypeScript
js/command-line-injection
Uncontrolled command line
CWE-74
JavaScript/TypeScript
js/indirect-command-line-injection
Indirect uncontrolled command line
CWE-74
JavaScript/TypeScript
js/second-order-command-line-injection
Second order command injection
CWE-74
JavaScript/TypeScript
js/shell-command-injection-from-environment
Shell command built from environment values
CWE-74
JavaScript/TypeScript
js/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-74
JavaScript/TypeScript
js/unnecessary-use-of-cat
Unnecessary use of cat process
CWE-74
JavaScript/TypeScript
js/xss-through-exception
Exception text reinterpreted as HTML
CWE-74
JavaScript/TypeScript
js/reflected-xss
Reflected cross-site scripting
CWE-74
JavaScript/TypeScript
js/stored-xss
Stored cross-site scripting
CWE-74
JavaScript/TypeScript
js/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-74
JavaScript/TypeScript
js/unsafe-jquery-plugin
Unsafe jQuery plugin
CWE-74
JavaScript/TypeScript
js/xss
Client-side cross-site scripting
CWE-74
JavaScript/TypeScript
js/xss-through-dom
DOM text reinterpreted as HTML
CWE-74
JavaScript/TypeScript
js/sql-injection
Database query built from user-controlled sources
CWE-74
JavaScript/TypeScript
js/code-injection
Code injection
CWE-74
JavaScript/TypeScript
js/bad-code-sanitization
Improper code sanitization
CWE-74
JavaScript/TypeScript
js/unsafe-code-construction
Unsafe code constructed from library input
CWE-74
JavaScript/TypeScript
js/unsafe-dynamic-method-access
Unsafe dynamic method access
CWE-74
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-74
JavaScript/TypeScript
js/incomplete-html-attribute-sanitization
Incomplete HTML attribute sanitization
CWE-74
JavaScript/TypeScript
js/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-74
JavaScript/TypeScript
js/incomplete-sanitization
Incomplete string escaping or encoding
CWE-74
JavaScript/TypeScript
js/unsafe-html-expansion
Unsafe expansion of self-closing HTML tag
CWE-74
JavaScript/TypeScript
js/tainted-format-string
Use of externally-controlled format string
CWE-74
JavaScript/TypeScript
js/client-side-unvalidated-url-redirection
Client-side URL redirect
CWE-74
JavaScript/TypeScript
js/xpath-injection
XPath injection
CWE-74
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-74
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-74
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-74
JavaScript/TypeScript
js/code-injection-dynamic-import
Code injection from dynamically imported code
CWE-74
JavaScript/TypeScript
js/env-key-and-value-injection
User controlled arbitrary environment variable injection
CWE-74
JavaScript/TypeScript
js/env-value-injection
User controlled environment variable value injection
CWE-74
JavaScript/TypeScript
js/command-line-injection-more-sources
Uncontrolled command line with additional heuristic sources
CWE-74
JavaScript/TypeScript
js/xss-more-sources
Client-side cross-site scripting with additional heuristic sources
CWE-74
JavaScript/TypeScript
js/sql-injection-more-sources
Database query built from user-controlled sources with additional heuristic sources
CWE-74
JavaScript/TypeScript
js/code-injection-more-sources
Code injection with additional heuristic sources
CWE-74
JavaScript/TypeScript
js/tainted-format-string-more-sources
Use of externally-controlled format string with additional heuristic sources
CWE-74
JavaScript/TypeScript
js/xpath-injection-more-sources
XPath injection with additional heuristic sources
CWE-74
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-74
Python
py/use-of-input
'input' function used in Python 2
CWE-74
Python
py/path-injection
Uncontrolled data used in path expression
CWE-74
Python
py/template-injection
Server Side Template Injection
CWE-74
Python
py/command-line-injection
Uncontrolled command line
CWE-74
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-74
Python
py/jinja2/autoescape-false
Jinja2 templating with autoescape=False
CWE-74
Python
py/reflective-xss
Reflected server-side cross-site scripting
CWE-74
Python
py/sql-injection
SQL query built from user-controlled sources
CWE-74
Python
py/ldap-injection
LDAP query built from user-controlled sources
CWE-74
Python
py/code-injection
Code injection
CWE-74
Python
py/http-response-splitting
HTTP Response Splitting
CWE-74
Python
py/xpath-injection
XPath query built from user-controlled sources
CWE-74
Python
py/nosql-injection
NoSQL Injection
CWE-74
Python
py/paramiko-command-injection
Command execution on a secondary remote server
CWE-74
Python
py/reflective-xss-email
Reflected server-side cross-site scripting
CWE-74
Python
py/xslt-injection
XSLT query built from user-controlled sources
CWE-74
Python
py/js2py-rce
JavaScript code execution
CWE-74
Ruby
rb/ldap-injection
LDAP Injection
CWE-74
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-74
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-74
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-74
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-74
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-74
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-74
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-74
Ruby
rb/reflected-xss
Reflected server-side cross-site scripting
CWE-74
Ruby
rb/stored-xss
Stored cross-site scripting
CWE-74
Ruby
rb/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-74
Ruby
rb/sql-injection
SQL query built from user-controlled sources
CWE-74
Ruby
rb/code-injection
Code injection
CWE-74
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-74
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-74
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-74
Ruby
rb/tainted-format-string
Use of externally-controlled format string
CWE-74
Rust
rust/regex-injection
Regular expression injection
CWE-74
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-74
Rust
rust/xss
Cross-site scripting
CWE-74
Rust
rust/sql-injection
Database query built from user-controlled sources
CWE-74
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-74
Swift
swift/command-line-injection
System command built from user-controlled sources
CWE-74
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-74
Swift
swift/sql-injection
Database query built from user-controlled sources
CWE-74
Swift
swift/unsafe-js-eval
JavaScript Injection
CWE-74
Swift
swift/uncontrolled-format-string
Uncontrolled format string
CWE-74
Swift
swift/predicate-injection
Predicate built from user-controlled sources
CWE-77
GitHub Actions
actions/envpath-injection/critical
PATH environment variable built from user-controlled sources
CWE-77
GitHub Actions
actions/envpath-injection/medium
PATH environment variable built from user-controlled sources
CWE-77
GitHub Actions
actions/envvar-injection/critical
Environment variable built from user-controlled sources
CWE-77
GitHub Actions
actions/envvar-injection/medium
Environment variable built from user-controlled sources
CWE-77
GitHub Actions
actions/command-injection/critical
Command built from user-controlled sources
CWE-77
GitHub Actions
actions/command-injection/medium
Command built from user-controlled sources
CWE-77
GitHub Actions
actions/argument-injection/critical
Argument injection
CWE-77
GitHub Actions
actions/argument-injection/medium
Argument injection
CWE-77
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-77
C/C++
cpp/wordexp-injection
Uncontrolled data used in wordexp command
CWE-77
C#
cs/command-line-injection
Uncontrolled command line
CWE-77
Go
go/command-injection
Command built from user-controlled sources
CWE-77
Go
go/stored-command
Command built from stored data
CWE-77
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-77
Java/Kotlin
java/relative-path-command
Executing a command with a relative path
CWE-77
Java/Kotlin
java/command-line-injection
Uncontrolled command line
CWE-77
Java/Kotlin
java/exec-tainted-environment
Building a command with an injected environment variable
CWE-77
Java/Kotlin
java/concatenated-command-line
Building a command line with string concatenation
CWE-77
Java/Kotlin
java/ognl-injection
OGNL Expression Language statement with user-controlled input
CWE-77
Java/Kotlin
java/command-line-injection-extra
Command Injection into Runtime.exec() with dangerous command
CWE-77
Java/Kotlin
java/command-line-injection-extra-local
Command Injection into Runtime.exec() with dangerous command
CWE-77
Java/Kotlin
java/command-line-injection-experimental
Uncontrolled command line (experimental sinks)
CWE-77
JavaScript/TypeScript
js/command-line-injection
Uncontrolled command line
CWE-77
JavaScript/TypeScript
js/indirect-command-line-injection
Indirect uncontrolled command line
CWE-77
JavaScript/TypeScript
js/second-order-command-line-injection
Second order command injection
CWE-77
JavaScript/TypeScript
js/shell-command-injection-from-environment
Shell command built from environment values
CWE-77
JavaScript/TypeScript
js/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-77
JavaScript/TypeScript
js/unnecessary-use-of-cat
Unnecessary use of cat process
CWE-77
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-77
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-77
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-77
JavaScript/TypeScript
js/command-line-injection-more-sources
Uncontrolled command line with additional heuristic sources
CWE-77
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-77
Python
py/command-line-injection
Uncontrolled command line
CWE-77
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-77
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-77
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-77
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-77
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-77
Swift
swift/command-line-injection
System command built from user-controlled sources
CWE-78
GitHub Actions
actions/command-injection/critical
Command built from user-controlled sources
CWE-78
GitHub Actions
actions/command-injection/medium
Command built from user-controlled sources
CWE-78
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-78
C/C++
cpp/wordexp-injection
Uncontrolled data used in wordexp command
CWE-78
C#
cs/command-line-injection
Uncontrolled command line
CWE-78
Go
go/command-injection
Command built from user-controlled sources
CWE-78
Go
go/stored-command
Command built from stored data
CWE-78
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-78
Java/Kotlin
java/relative-path-command
Executing a command with a relative path
CWE-78
Java/Kotlin
java/command-line-injection
Uncontrolled command line
CWE-78
Java/Kotlin
java/exec-tainted-environment
Building a command with an injected environment variable
CWE-78
Java/Kotlin
java/concatenated-command-line
Building a command line with string concatenation
CWE-78
Java/Kotlin
java/command-line-injection-extra
Command Injection into Runtime.exec() with dangerous command
CWE-78
Java/Kotlin
java/command-line-injection-extra-local
Command Injection into Runtime.exec() with dangerous command
CWE-78
Java/Kotlin
java/command-line-injection-experimental
Uncontrolled command line (experimental sinks)
CWE-78
JavaScript/TypeScript
js/command-line-injection
Uncontrolled command line
CWE-78
JavaScript/TypeScript
js/indirect-command-line-injection
Indirect uncontrolled command line
CWE-78
JavaScript/TypeScript
js/second-order-command-line-injection
Second order command injection
CWE-78
JavaScript/TypeScript
js/shell-command-injection-from-environment
Shell command built from environment values
CWE-78
JavaScript/TypeScript
js/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-78
JavaScript/TypeScript
js/unnecessary-use-of-cat
Unnecessary use of cat process
CWE-78
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-78
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-78
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-78
JavaScript/TypeScript
js/command-line-injection-more-sources
Uncontrolled command line with additional heuristic sources
CWE-78
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-78
Python
py/command-line-injection
Uncontrolled command line
CWE-78
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-78
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-78
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-78
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-78
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-78
Swift
swift/command-line-injection
System command built from user-controlled sources
CWE-79
C/C++
cpp/cgi-xss
CGI script vulnerable to cross-site scripting
CWE-79
C#
cs/web/xss
Cross-site scripting
CWE-79
Go
go/html-template-escaping-bypass-xss
Cross-site scripting via HTML template escaping bypass
CWE-79
Go
go/reflected-xss
Reflected cross-site scripting
CWE-79
Go
go/stored-xss
Stored cross-site scripting
CWE-79
Java/Kotlin
java/android/webview-addjavascriptinterface
Access Java object methods through JavaScript exposure
CWE-79
Java/Kotlin
java/android/websettings-javascript-enabled
Android WebView JavaScript settings
CWE-79
Java/Kotlin
java/xss
Cross-site scripting
CWE-79
Java/Kotlin
java/android/unsafe-android-webview-fetch
Unsafe resource fetching in Android WebView
CWE-79
JavaScript/TypeScript
js/disabling-electron-websecurity
Disabling Electron webSecurity
CWE-79
JavaScript/TypeScript
js/xss-through-exception
Exception text reinterpreted as HTML
CWE-79
JavaScript/TypeScript
js/reflected-xss
Reflected cross-site scripting
CWE-79
JavaScript/TypeScript
js/stored-xss
Stored cross-site scripting
CWE-79
JavaScript/TypeScript
js/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-79
JavaScript/TypeScript
js/unsafe-jquery-plugin
Unsafe jQuery plugin
CWE-79
JavaScript/TypeScript
js/xss
Client-side cross-site scripting
CWE-79
JavaScript/TypeScript
js/xss-through-dom
DOM text reinterpreted as HTML
CWE-79
JavaScript/TypeScript
js/code-injection
Code injection
CWE-79
JavaScript/TypeScript
js/bad-code-sanitization
Improper code sanitization
CWE-79
JavaScript/TypeScript
js/unsafe-code-construction
Unsafe code constructed from library input
CWE-79
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-79
JavaScript/TypeScript
js/incomplete-html-attribute-sanitization
Incomplete HTML attribute sanitization
CWE-79
JavaScript/TypeScript
js/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-79
JavaScript/TypeScript
js/incomplete-sanitization
Incomplete string escaping or encoding
CWE-79
JavaScript/TypeScript
js/unsafe-html-expansion
Unsafe expansion of self-closing HTML tag
CWE-79
JavaScript/TypeScript
js/client-side-unvalidated-url-redirection
Client-side URL redirect
CWE-79
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-79
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-79
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-79
JavaScript/TypeScript
js/code-injection-dynamic-import
Code injection from dynamically imported code
CWE-79
JavaScript/TypeScript
js/xss-more-sources
Client-side cross-site scripting with additional heuristic sources
CWE-79
JavaScript/TypeScript
js/code-injection-more-sources
Code injection with additional heuristic sources
CWE-79
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-79
Python
py/jinja2/autoescape-false
Jinja2 templating with autoescape=False
CWE-79
Python
py/reflective-xss
Reflected server-side cross-site scripting
CWE-79
Python
py/http-response-splitting
HTTP Response Splitting
CWE-79
Python
py/reflective-xss-email
Reflected server-side cross-site scripting
CWE-79
Ruby
rb/reflected-xss
Reflected server-side cross-site scripting
CWE-79
Ruby
rb/stored-xss
Stored cross-site scripting
CWE-79
Ruby
rb/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-79
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-79
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-79
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-79
Rust
rust/xss
Cross-site scripting
CWE-79
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-80
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-80
JavaScript/TypeScript
js/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-80
JavaScript/TypeScript
js/incomplete-sanitization
Incomplete string escaping or encoding
CWE-80
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-80
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-88
GitHub Actions
actions/argument-injection/critical
Argument injection
CWE-88
GitHub Actions
actions/argument-injection/medium
Argument injection
CWE-88
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-88
C#
cs/command-line-injection
Uncontrolled command line
CWE-88
Java/Kotlin
java/relative-path-command
Executing a command with a relative path
CWE-88
Java/Kotlin
java/command-line-injection
Uncontrolled command line
CWE-88
Java/Kotlin
java/exec-tainted-environment
Building a command with an injected environment variable
CWE-88
Java/Kotlin
java/concatenated-command-line
Building a command line with string concatenation
CWE-88
Java/Kotlin
java/command-line-injection-experimental
Uncontrolled command line (experimental sinks)
CWE-88
JavaScript/TypeScript
js/command-line-injection
Uncontrolled command line
CWE-88
JavaScript/TypeScript
js/indirect-command-line-injection
Indirect uncontrolled command line
CWE-88
JavaScript/TypeScript
js/second-order-command-line-injection
Second order command injection
CWE-88
JavaScript/TypeScript
js/shell-command-injection-from-environment
Shell command built from environment values
CWE-88
JavaScript/TypeScript
js/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-88
JavaScript/TypeScript
js/command-line-injection-more-sources
Uncontrolled command line with additional heuristic sources
CWE-88
Python
py/command-line-injection
Uncontrolled command line
CWE-88
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-88
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-88
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-88
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-88
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-88
Swift
swift/command-line-injection
System command built from user-controlled sources
CWE-89
C/C++
cpp/sql-injection
Uncontrolled data in SQL query
CWE-89
C#
cs/sql-injection
SQL query built from user-controlled sources
CWE-89
Go
go/sql-injection
Database query built from user-controlled sources
CWE-89
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-89
Java/Kotlin
java/concatenated-sql-query
Query built by concatenation with a possibly-untrusted string
CWE-89
Java/Kotlin
java/sql-injection
Query built from user-controlled sources
CWE-89
Java/Kotlin
java/mybatis-annotation-sql-injection
SQL injection in MyBatis annotation
CWE-89
Java/Kotlin
java/mybatis-xml-sql-injection
SQL injection in MyBatis Mapper XML
CWE-89
JavaScript/TypeScript
js/sql-injection
Database query built from user-controlled sources
CWE-89
JavaScript/TypeScript
js/env-key-and-value-injection
User controlled arbitrary environment variable injection
CWE-89
JavaScript/TypeScript
js/env-value-injection
User controlled environment variable value injection
CWE-89
JavaScript/TypeScript
js/sql-injection-more-sources
Database query built from user-controlled sources with additional heuristic sources
CWE-89
Python
py/sql-injection
SQL query built from user-controlled sources
CWE-89
Ruby
rb/sql-injection
SQL query built from user-controlled sources
CWE-89
Rust
rust/sql-injection
Database query built from user-controlled sources
CWE-89
Swift
swift/sql-injection
Database query built from user-controlled sources
CWE-90
C#
cs/ldap-injection
LDAP query built from user-controlled sources
CWE-90
Go
go/ldap-injection
LDAP query built from user-controlled sources
CWE-90
Java/Kotlin
java/ldap-injection
LDAP query built from user-controlled sources
CWE-90
JavaScript/TypeScript
js/sql-injection
Database query built from user-controlled sources
CWE-90
JavaScript/TypeScript
js/sql-injection-more-sources
Database query built from user-controlled sources with additional heuristic sources
CWE-90
Python
py/ldap-injection
LDAP query built from user-controlled sources
CWE-90
Ruby
rb/ldap-injection
LDAP Injection
CWE-91
C#
cs/xml-injection
XML injection
CWE-91
C#
cs/xml/xpath-injection
XPath injection
CWE-91
Go
go/xml/xpath-injection
XPath injection
CWE-91
Java/Kotlin
java/xml/xpath-injection
XPath injection
CWE-91
Java/Kotlin
java/xquery-injection
XQuery query built from user-controlled sources
CWE-91
JavaScript/TypeScript
js/xpath-injection
XPath injection
CWE-91
JavaScript/TypeScript
js/xpath-injection-more-sources
XPath injection with additional heuristic sources
CWE-91
Python
py/xpath-injection
XPath query built from user-controlled sources
CWE-91
Python
py/xslt-injection
XSLT query built from user-controlled sources
CWE-91
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-93
C#
cs/web/disabled-header-checking
Header checking disabled
CWE-93
Java/Kotlin
java/netty-http-request-or-response-splitting
Disabled Netty HTTP header validation
CWE-93
Java/Kotlin
java/http-response-splitting
HTTP response splitting
CWE-93
Python
py/http-response-splitting
HTTP Response Splitting
CWE-94
GitHub Actions
actions/code-injection/critical
Code injection
CWE-94
GitHub Actions
actions/code-injection/medium
Code injection
CWE-94
GitHub Actions
actions/cache-poisoning/code-injection
Cache Poisoning via low-privileged code injection
CWE-94
C#
cs/code-injection
Improper control of generation of code
CWE-94
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-94
Java/Kotlin
java/android/arbitrary-apk-installation
Android APK installation
CWE-94
Java/Kotlin
java/groovy-injection
Groovy Language injection
CWE-94
Java/Kotlin
java/insecure-bean-validation
Insecure Bean Validation
CWE-94
Java/Kotlin
java/jexl-expression-injection
Expression language injection (JEXL)
CWE-94
Java/Kotlin
java/mvel-expression-injection
Expression language injection (MVEL)
CWE-94
Java/Kotlin
java/spel-expression-injection
Expression language injection (Spring)
CWE-94
Java/Kotlin
java/server-side-template-injection
Server-side template injection
CWE-94
Java/Kotlin
java/beanshell-injection
BeanShell injection
CWE-94
Java/Kotlin
java/android-insecure-dex-loading
Insecure loading of an Android Dex File
CWE-94
Java/Kotlin
java/jshell-injection
JShell injection
CWE-94
Java/Kotlin
java/javaee-expression-injection
Jakarta Expression Language injection
CWE-94
Java/Kotlin
java/jython-injection
Injection in Jython
CWE-94
Java/Kotlin
java/unsafe-eval
Injection in Java Script Engine
CWE-94
Java/Kotlin
java/spring-view-manipulation-implicit
Spring Implicit View Manipulation
CWE-94
Java/Kotlin
java/spring-view-manipulation
Spring View Manipulation
CWE-94
JavaScript/TypeScript
js/enabling-electron-renderer-node-integration
Enabling Node.js integration for Electron web content renderers
CWE-94
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-94
JavaScript/TypeScript
js/code-injection
Code injection
CWE-94
JavaScript/TypeScript
js/bad-code-sanitization
Improper code sanitization
CWE-94
JavaScript/TypeScript
js/unsafe-code-construction
Unsafe code constructed from library input
CWE-94
JavaScript/TypeScript
js/unsafe-dynamic-method-access
Unsafe dynamic method access
CWE-94
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-94
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-94
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-94
JavaScript/TypeScript
js/code-injection-dynamic-import
Code injection from dynamically imported code
CWE-94
JavaScript/TypeScript
js/code-injection-more-sources
Code injection with additional heuristic sources
CWE-94
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-94
Python
py/use-of-input
'input' function used in Python 2
CWE-94
Python
py/code-injection
Code injection
CWE-94
Python
py/js2py-rce
JavaScript code execution
CWE-94
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-94
Ruby
rb/code-injection
Code injection
CWE-94
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-94
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-94
Swift
swift/unsafe-js-eval
JavaScript Injection
CWE-95
GitHub Actions
actions/code-injection/critical
Code injection
CWE-95
GitHub Actions
actions/code-injection/medium
Code injection
CWE-95
C#
cs/code-injection
Improper control of generation of code
CWE-95
Java/Kotlin
java/jython-injection
Injection in Jython
CWE-95
JavaScript/TypeScript
js/code-injection
Code injection
CWE-95
JavaScript/TypeScript
js/code-injection-dynamic-import
Code injection from dynamically imported code
CWE-95
JavaScript/TypeScript
js/code-injection-more-sources
Code injection with additional heuristic sources
CWE-95
Python
py/use-of-input
'input' function used in Python 2
CWE-95
Python
py/code-injection
Code injection
CWE-95
Ruby
rb/code-injection
Code injection
CWE-95
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-95
Swift
swift/unsafe-js-eval
JavaScript Injection
CWE-96
C#
cs/code-injection
Improper control of generation of code
CWE-99
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-99
C#
cs/resource-injection
Resource injection
CWE-99
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-99
Go
go/path-injection
Uncontrolled data used in path expression
CWE-99
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-99
Python
py/path-injection
Uncontrolled data used in path expression
CWE-99
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-99
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-99
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-112
C#
cs/xml/missing-validation
Missing XML validation
CWE-113
C#
cs/web/disabled-header-checking
Header checking disabled
CWE-113
Java/Kotlin
java/netty-http-request-or-response-splitting
Disabled Netty HTTP header validation
CWE-113
Java/Kotlin
java/http-response-splitting
HTTP response splitting
CWE-113
Python
py/http-response-splitting
HTTP Response Splitting
CWE-114
C/C++
cpp/uncontrolled-process-operation
Uncontrolled process operation
CWE-114
C#
cs/assembly-path-injection
Assembly path injection
CWE-116
GitHub Actions
actions/code-injection/critical
Code injection
CWE-116
GitHub Actions
actions/code-injection/medium
Code injection
CWE-116
C#
cs/web/xss
Cross-site scripting
CWE-116
C#
cs/log-forging
Log entries created from user input
CWE-116
C#
cs/inappropriate-encoding
Inappropriate encoding
CWE-116
Go
go/html-template-escaping-bypass-xss
Cross-site scripting via HTML template escaping bypass
CWE-116
Go
go/reflected-xss
Reflected cross-site scripting
CWE-116
Go
go/stored-xss
Stored cross-site scripting
CWE-116
Go
go/log-injection
Log entries created from user input
CWE-116
Java/Kotlin
java/log-injection
Log Injection
CWE-116
JavaScript/TypeScript
js/angular/disabling-sce
Disabling SCE
CWE-116
JavaScript/TypeScript
js/identity-replacement
Replacement of a substring with itself
CWE-116
JavaScript/TypeScript
js/xss-through-exception
Exception text reinterpreted as HTML
CWE-116
JavaScript/TypeScript
js/reflected-xss
Reflected cross-site scripting
CWE-116
JavaScript/TypeScript
js/stored-xss
Stored cross-site scripting
CWE-116
JavaScript/TypeScript
js/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-116
JavaScript/TypeScript
js/unsafe-jquery-plugin
Unsafe jQuery plugin
CWE-116
JavaScript/TypeScript
js/xss
Client-side cross-site scripting
CWE-116
JavaScript/TypeScript
js/xss-through-dom
DOM text reinterpreted as HTML
CWE-116
JavaScript/TypeScript
js/code-injection
Code injection
CWE-116
JavaScript/TypeScript
js/bad-code-sanitization
Improper code sanitization
CWE-116
JavaScript/TypeScript
js/unsafe-code-construction
Unsafe code constructed from library input
CWE-116
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-116
JavaScript/TypeScript
js/double-escaping
Double escaping or unescaping
CWE-116
JavaScript/TypeScript
js/incomplete-html-attribute-sanitization
Incomplete HTML attribute sanitization
CWE-116
JavaScript/TypeScript
js/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-116
JavaScript/TypeScript
js/incomplete-sanitization
Incomplete string escaping or encoding
CWE-116
JavaScript/TypeScript
js/unsafe-html-expansion
Unsafe expansion of self-closing HTML tag
CWE-116
JavaScript/TypeScript
js/log-injection
Log injection
CWE-116
JavaScript/TypeScript
js/client-side-unvalidated-url-redirection
Client-side URL redirect
CWE-116
JavaScript/TypeScript
js/code-injection-dynamic-import
Code injection from dynamically imported code
CWE-116
JavaScript/TypeScript
js/xss-more-sources
Client-side cross-site scripting with additional heuristic sources
CWE-116
JavaScript/TypeScript
js/code-injection-more-sources
Code injection with additional heuristic sources
CWE-116
JavaScript/TypeScript
js/log-injection-more-sources
Log injection with additional heuristic sources
CWE-116
Python
py/reflective-xss
Reflected server-side cross-site scripting
CWE-116
Python
py/code-injection
Code injection
CWE-116
Python
py/bad-tag-filter
Bad HTML filtering regexp
CWE-116
Python
py/log-injection
Log Injection
CWE-116
Python
py/reflective-xss-email
Reflected server-side cross-site scripting
CWE-116
Ruby
rb/reflected-xss
Reflected server-side cross-site scripting
CWE-116
Ruby
rb/stored-xss
Stored cross-site scripting
CWE-116
Ruby
rb/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-116
Ruby
rb/code-injection
Code injection
CWE-116
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-116
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-116
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-116
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-116
Ruby
rb/log-injection
Log injection
CWE-116
Rust
rust/xss
Cross-site scripting
CWE-116
Rust
rust/log-injection
Log injection
CWE-116
Swift
swift/bad-tag-filter
Bad HTML filtering regexp
CWE-117
C#
cs/log-forging
Log entries created from user input
CWE-117
Go
go/log-injection
Log entries created from user input
CWE-117
Java/Kotlin
java/log-injection
Log Injection
CWE-117
JavaScript/TypeScript
js/log-injection
Log injection
CWE-117
JavaScript/TypeScript
js/log-injection-more-sources
Log injection with additional heuristic sources
CWE-117
Python
py/log-injection
Log Injection
CWE-117
Ruby
rb/log-injection
Log injection
CWE-117
Rust
rust/log-injection
Log injection
CWE-118
C/C++
cpp/offset-use-before-range-check
Array offset used before range check
CWE-118
C/C++
cpp/double-free
Potential double free
CWE-118
C/C++
cpp/late-negative-test
Pointer offset used before it is checked
CWE-118
C/C++
cpp/missing-negativity-test
Unchecked return value used as offset
CWE-118
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-118
C/C++
cpp/overflow-destination
Copy function using source size
CWE-118
C/C++
cpp/static-buffer-overflow
Static array access may cause overflow
CWE-118
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-118
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-118
C/C++
cpp/use-after-free
Potential use after free
CWE-118
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-118
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-118
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-118
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-118
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-118
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-118
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-118
C/C++
cpp/overrun-write
Overrunning write
CWE-118
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-118
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-118
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-118
C/C++
cpp/unbounded-write
Unbounded write
CWE-118
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-118
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-118
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-118
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-118
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-118
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-118
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-118
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-118
C/C++
cpp/memory-unsafe-function-scan
Scanf function without a specified length
CWE-118
C/C++
cpp/dangerous-use-convert-function
Dangerous use convert function
CWE-118
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-118
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-118
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-118
C/C++
cpp/sign-conversion-pointer-arithmetic
unsigned to signed used in pointer arithmetic
CWE-118
C/C++
cpp/access-memory-location-after-end-buffer-strlen
Access Of Memory Location After End Of Buffer
CWE-118
C/C++
cpp/buffer-access-with-incorrect-length-value
Buffer access with incorrect length value
CWE-118
C#
cs/unvalidated-local-pointer-arithmetic
Unvalidated local pointer arithmetic
CWE-118
Go
go/wrong-usage-of-unsafe
Wrong usage of package unsafe
CWE-118
Rust
rust/access-after-lifetime-ended
Access of a pointer after its lifetime has ended
CWE-118
Rust
rust/access-invalid-pointer
Access of invalid pointer
CWE-119
C/C++
cpp/offset-use-before-range-check
Array offset used before range check
CWE-119
C/C++
cpp/double-free
Potential double free
CWE-119
C/C++
cpp/late-negative-test
Pointer offset used before it is checked
CWE-119
C/C++
cpp/missing-negativity-test
Unchecked return value used as offset
CWE-119
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-119
C/C++
cpp/overflow-destination
Copy function using source size
CWE-119
C/C++
cpp/static-buffer-overflow
Static array access may cause overflow
CWE-119
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-119
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-119
C/C++
cpp/use-after-free
Potential use after free
CWE-119
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-119
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-119
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-119
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-119
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-119
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-119
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-119
C/C++
cpp/overrun-write
Overrunning write
CWE-119
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-119
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-119
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-119
C/C++
cpp/unbounded-write
Unbounded write
CWE-119
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-119
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-119
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-119
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-119
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-119
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-119
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-119
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-119
C/C++
cpp/memory-unsafe-function-scan
Scanf function without a specified length
CWE-119
C/C++
cpp/dangerous-use-convert-function
Dangerous use convert function
CWE-119
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-119
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-119
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-119
C/C++
cpp/sign-conversion-pointer-arithmetic
unsigned to signed used in pointer arithmetic
CWE-119
C/C++
cpp/access-memory-location-after-end-buffer-strlen
Access Of Memory Location After End Of Buffer
CWE-119
C/C++
cpp/buffer-access-with-incorrect-length-value
Buffer access with incorrect length value
CWE-119
C#
cs/unvalidated-local-pointer-arithmetic
Unvalidated local pointer arithmetic
CWE-119
Go
go/wrong-usage-of-unsafe
Wrong usage of package unsafe
CWE-119
Rust
rust/access-after-lifetime-ended
Access of a pointer after its lifetime has ended
CWE-119
Rust
rust/access-invalid-pointer
Access of invalid pointer
CWE-120
C/C++
cpp/offset-use-before-range-check
Array offset used before range check
CWE-120
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-120
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-120
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-120
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-120
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-120
C/C++
cpp/unbounded-write
Unbounded write
CWE-120
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-120
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-120
C/C++
cpp/memory-unsafe-function-scan
Scanf function without a specified length
CWE-120
C#
cs/unvalidated-local-pointer-arithmetic
Unvalidated local pointer arithmetic
CWE-121
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-121
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-122
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-122
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-122
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-122
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-122
C#
cs/unvalidated-local-pointer-arithmetic
Unvalidated local pointer arithmetic
CWE-125
C/C++
cpp/offset-use-before-range-check
Array offset used before range check
CWE-125
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-125
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-125
C/C++
cpp/dangerous-use-convert-function
Dangerous use convert function
CWE-125
Go
go/wrong-usage-of-unsafe
Wrong usage of package unsafe
CWE-126
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-126
Go
go/wrong-usage-of-unsafe
Wrong usage of package unsafe
CWE-128
C/C++
cpp/signed-overflow-check
Signed overflow check
CWE-128
C/C++
cpp/multiplication-overflow-in-alloc
Multiplication result may overflow and be used in allocation
CWE-129
C/C++
cpp/unclear-array-index-validation
Unclear validation of array index
CWE-129
Go
go/constant-length-comparison
Constant length comparison
CWE-129
Java/Kotlin
java/improper-validation-of-array-construction
Improper validation of user-provided size used for array construction
CWE-129
Java/Kotlin
java/improper-validation-of-array-construction-code-specified
Improper validation of code-specified size used for array construction
CWE-129
Java/Kotlin
java/improper-validation-of-array-index
Improper validation of user-provided array index
CWE-129
Java/Kotlin
java/improper-validation-of-array-index-code-specified
Improper validation of code-specified array index
CWE-131
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-131
C/C++
cpp/overflow-destination
Copy function using source size
CWE-131
C/C++
cpp/static-buffer-overflow
Static array access may cause overflow
CWE-131
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-131
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-131
C/C++
cpp/overrun-write
Overrunning write
CWE-131
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-134
C/C++
cpp/non-constant-format
Non-constant format string
CWE-134
C/C++
cpp/tainted-format-string
Uncontrolled format string
CWE-134
C#
cs/uncontrolled-format-string
Uncontrolled format string
CWE-134
Java/Kotlin
java/tainted-format-string
Use of externally-controlled format string
CWE-134
JavaScript/TypeScript
js/tainted-format-string
Use of externally-controlled format string
CWE-134
JavaScript/TypeScript
js/tainted-format-string-more-sources
Use of externally-controlled format string with additional heuristic sources
CWE-134
Ruby
rb/tainted-format-string
Use of externally-controlled format string
CWE-134
Swift
swift/uncontrolled-format-string
Uncontrolled format string
CWE-135
Swift
swift/string-length-conflation
String length conflation
CWE-170
C/C++
cpp/improper-null-termination
Potential improper null termination
CWE-170
C/C++
cpp/user-controlled-null-termination-tainted
User-controlled data may not be null terminated
CWE-172
Python
py/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-172
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-176
Python
py/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-176
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-178
JavaScript/TypeScript
js/case-sensitive-middleware-path
Case-sensitive middleware path
CWE-179
Python
py/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-179
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-180
Python
py/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-180
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-183
Go
go/cors-misconfiguration
CORS misconfiguration
CWE-183
JavaScript/TypeScript
js/angular/insecure-url-whitelist
Insecure URL whitelist
CWE-183
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-183
JavaScript/TypeScript
js/cors-permissive-configuration
Permissive CORS configuration
CWE-183
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-183
Python
py/cors-misconfiguration-with-credentials
Cors misconfiguration with credentials
CWE-184
JavaScript/TypeScript
js/incomplete-url-scheme-check
Incomplete URL scheme check
CWE-184
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-185
Java/Kotlin
java/permissive-dot-regex
URL matched by permissive . in a regular expression
CWE-185
JavaScript/TypeScript
js/angular/insecure-url-whitelist
Insecure URL whitelist
CWE-185
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-185
Python
py/bad-tag-filter
Bad HTML filtering regexp
CWE-185
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-185
Swift
swift/bad-tag-filter
Bad HTML filtering regexp
CWE-186
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-186
Python
py/bad-tag-filter
Bad HTML filtering regexp
CWE-186
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-186
Swift
swift/bad-tag-filter
Bad HTML filtering regexp
CWE-190
C/C++
cpp/ambiguously-signed-bit-field
Ambiguously signed bit-field member
CWE-190
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-190
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-190
C/C++
cpp/signed-overflow-check
Signed overflow check
CWE-190
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-190
C/C++
cpp/tainted-arithmetic
User-controlled data in arithmetic expression
CWE-190
C/C++
cpp/uncontrolled-arithmetic
Uncontrolled data in arithmetic expression
CWE-190
C/C++
cpp/arithmetic-with-extreme-values
Use of extreme values in arithmetic expression
CWE-190
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-190
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-190
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-190
C/C++
cpp/multiplication-overflow-in-alloc
Multiplication result may overflow and be used in allocation
CWE-190
C/C++
cpp/dangerous-use-of-transformation-after-operation
Dangerous use of transformation after operation
CWE-190
C/C++
cpp/signed-bit-field
Possible signed bit-field member
CWE-190
C#
cs/loss-of-precision
Possible loss of precision
CWE-190
Go
go/allocation-size-overflow
Size computation for allocation may overflow
CWE-190
Go
go/incorrect-integer-conversion
Incorrect conversion between integer types
CWE-190
Java/Kotlin
java/implicit-cast-in-compound-assignment
Implicit narrowing conversion in compound assignment
CWE-190
Java/Kotlin
java/integer-multiplication-cast-to-long
Result of multiplication cast to wider type
CWE-190
Java/Kotlin
java/tainted-arithmetic
User-controlled data in arithmetic expression
CWE-190
Java/Kotlin
java/uncontrolled-arithmetic
Uncontrolled data in arithmetic expression
CWE-190
Java/Kotlin
java/extreme-value-arithmetic
Use of extreme values in arithmetic expression
CWE-190
Java/Kotlin
java/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-191
C/C++
cpp/tainted-arithmetic
User-controlled data in arithmetic expression
CWE-191
C/C++
cpp/uncontrolled-arithmetic
Uncontrolled data in arithmetic expression
CWE-191
C/C++
cpp/arithmetic-with-extreme-values
Use of extreme values in arithmetic expression
CWE-191
C/C++
cpp/unsigned-difference-expression-compared-zero
Unsigned difference expression compared to zero
CWE-191
Java/Kotlin
java/tainted-arithmetic
User-controlled data in arithmetic expression
CWE-191
Java/Kotlin
java/uncontrolled-arithmetic
Uncontrolled data in arithmetic expression
CWE-191
Java/Kotlin
java/extreme-value-arithmetic
Use of extreme values in arithmetic expression
CWE-193
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-193
C#
cs/index-out-of-bounds
Off-by-one comparison against container length
CWE-193
Go
go/index-out-of-bounds
Off-by-one comparison against length
CWE-193
Java/Kotlin
java/index-out-of-bounds
Array index out of bounds
CWE-193
JavaScript/TypeScript
js/index-out-of-bounds
Off-by-one comparison against length
CWE-197
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-197
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-197
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-197
C#
cs/loss-of-precision
Possible loss of precision
CWE-197
Go
go/shift-out-of-range
Shift out of range
CWE-197
Java/Kotlin
java/implicit-cast-in-compound-assignment
Implicit narrowing conversion in compound assignment
CWE-197
Java/Kotlin
java/integer-multiplication-cast-to-long
Result of multiplication cast to wider type
CWE-197
Java/Kotlin
java/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-197
Java/Kotlin
java/tainted-numeric-cast
User-controlled data in numeric cast
CWE-197
JavaScript/TypeScript
js/shift-out-of-range
Shift out of range
CWE-200
GitHub Actions
actions/secret-exfiltration
Secret exfiltration
CWE-200
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-200
C/C++
cpp/system-data-exposure
Exposure of system data to an unauthorized control sphere
CWE-200
C/C++
cpp/potential-system-data-exposure
Potential exposure of sensitive system data to an unauthorized control sphere
CWE-200
C/C++
cpp/work-with-file-without-permissions-rights
Writing to a file without setting permissions
CWE-200
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-200
C/C++
cpp/private-cleartext-write
Exposure of private information
CWE-200
C#
cs/web/debug-binary
Creating an ASP.NET debug binary may reveal sensitive information
CWE-200
C#
cs/sensitive-data-transmission
Information exposure through transmitted data
CWE-200
C#
cs/information-exposure-through-exception
Information exposure through an exception
CWE-200
C#
cs/cleartext-storage-of-sensitive-information
Clear text storage of sensitive information
CWE-200
C#
cs/exposure-of-sensitive-information
Exposure of private information
CWE-200
C#
cs/web/directory-browse-enabled
ASP.NET config file enables directory browsing
CWE-200
C#
cs/web/persistent-cookie
Cookie security: persistent cookie
CWE-200
Go
go/stack-trace-exposure
Information exposure through a stack trace
CWE-200
Go
go/clear-text-logging
Clear-text logging of sensitive information
CWE-200
Go
go/timing-attack
Timing attacks due to comparison of sensitive secrets
CWE-200
Java/Kotlin
java/android/sensitive-notification
Exposure of sensitive information to notifications
CWE-200
Java/Kotlin
java/android/sensitive-text
Exposure of sensitive information to UI text views
CWE-200
Java/Kotlin
java/android/websettings-allow-content-access
Android WebView settings allows access to content links
CWE-200
Java/Kotlin
java/android/websettings-file-access
Android WebSettings file access
CWE-200
Java/Kotlin
java/spring-boot-exposed-actuators
Exposed Spring Boot actuators
CWE-200
Java/Kotlin
java/spring-boot-exposed-actuators-config
Exposed Spring Boot actuators in configuration file
CWE-200
Java/Kotlin
java/local-temp-file-or-directory-information-disclosure
Local information disclosure in a temporary directory
CWE-200
Java/Kotlin
java/error-message-exposure
Information exposure through an error message
CWE-200
Java/Kotlin
java/stack-trace-exposure
Information exposure through a stack trace
CWE-200
Java/Kotlin
java/android/sensitive-keyboard-cache
Android sensitive keyboard cache
CWE-200
Java/Kotlin
java/sensitive-log
Insertion of sensitive information into log files
CWE-200
Java/Kotlin
java/insecure-webview-resource-response
Insecure Android WebView Resource Response
CWE-200
Java/Kotlin
java/sensitive-android-file-leak
Leaking sensitive Android file
CWE-200
Java/Kotlin
java/possible-timing-attack-against-signature
Possible timing attack against signature validation
CWE-200
Java/Kotlin
java/timing-attack-against-headers-value
Timing attack against header value
CWE-200
Java/Kotlin
java/timing-attack-against-signature
Timing attack against signature validation
CWE-200
Java/Kotlin
java/server-directory-listing
Directories and files exposure
CWE-200
Java/Kotlin
java/sensitive-query-with-get
Sensitive GET Query
CWE-200
JavaScript/TypeScript
js/unsafe-external-link
Potentially unsafe external link
CWE-200
JavaScript/TypeScript
js/file-access-to-http
File data in outbound network request
CWE-200
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-200
JavaScript/TypeScript
js/cross-window-information-leak
Cross-window communication with unrestricted target origin
CWE-200
JavaScript/TypeScript
js/stack-trace-exposure
Information exposure through a stack trace
CWE-200
JavaScript/TypeScript
js/build-artifact-leak
Storage of sensitive information in build artifact
CWE-200
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-200
JavaScript/TypeScript
js/clear-text-storage-of-sensitive-data
Clear text storage of sensitive information
CWE-200
JavaScript/TypeScript
js/sensitive-get-query
Sensitive data read from GET request
CWE-200
Python
py/bind-socket-all-network-interfaces
Binding a socket to all network interfaces
CWE-200
Python
py/stack-trace-exposure
Information exposure through an exception
CWE-200
Python
py/flask-debug
Flask app is run in debug mode
CWE-200
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-200
Python
py/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-200
Python
py/possible-timing-attack-against-hash
Timing attack against Hash
CWE-200
Python
py/timing-attack-against-hash
Timing attack against Hash
CWE-200
Python
py/timing-attack-against-header-value
Timing attack against header value
CWE-200
Python
py/possible-timing-attack-sensitive-info
Timing attack against secret
CWE-200
Python
py/timing-attack-sensitive-info
Timing attack against secret
CWE-200
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-200
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-200
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-200
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-200
Ruby
rb/sensitive-get-query
Sensitive data read from GET request
CWE-200
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-200
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-201
C#
cs/sensitive-data-transmission
Information exposure through transmitted data
CWE-201
JavaScript/TypeScript
js/cross-window-information-leak
Cross-window communication with unrestricted target origin
CWE-203
Go
go/timing-attack
Timing attacks due to comparison of sensitive secrets
CWE-203
Java/Kotlin
java/possible-timing-attack-against-signature
Possible timing attack against signature validation
CWE-203
Java/Kotlin
java/timing-attack-against-headers-value
Timing attack against header value
CWE-203
Java/Kotlin
java/timing-attack-against-signature
Timing attack against signature validation
CWE-203
Python
py/possible-timing-attack-against-hash
Timing attack against Hash
CWE-203
Python
py/timing-attack-against-hash
Timing attack against Hash
CWE-203
Python
py/timing-attack-against-header-value
Timing attack against header value
CWE-203
Python
py/possible-timing-attack-sensitive-info
Timing attack against secret
CWE-203
Python
py/timing-attack-sensitive-info
Timing attack against secret
CWE-203
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-208
Java/Kotlin
java/possible-timing-attack-against-signature
Possible timing attack against signature validation
CWE-208
Java/Kotlin
java/timing-attack-against-headers-value
Timing attack against header value
CWE-208
Java/Kotlin
java/timing-attack-against-signature
Timing attack against signature validation
CWE-208
Python
py/possible-timing-attack-against-hash
Timing attack against Hash
CWE-208
Python
py/timing-attack-against-hash
Timing attack against Hash
CWE-208
Python
py/timing-attack-against-header-value
Timing attack against header value
CWE-208
Python
py/possible-timing-attack-sensitive-info
Timing attack against secret
CWE-208
Python
py/timing-attack-sensitive-info
Timing attack against secret
CWE-208
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-209
C#
cs/information-exposure-through-exception
Information exposure through an exception
CWE-209
Go
go/stack-trace-exposure
Information exposure through a stack trace
CWE-209
Java/Kotlin
java/error-message-exposure
Information exposure through an error message
CWE-209
Java/Kotlin
java/stack-trace-exposure
Information exposure through a stack trace
CWE-209
JavaScript/TypeScript
js/stack-trace-exposure
Information exposure through a stack trace
CWE-209
Python
py/stack-trace-exposure
Information exposure through an exception
CWE-209
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-215
C#
cs/web/debug-binary
Creating an ASP.NET debug binary may reveal sensitive information
CWE-215
Python
py/flask-debug
Flask app is run in debug mode
CWE-216
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-219
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-221
C#
cs/catch-of-all-exceptions
Generic catch clause
CWE-221
C#
cs/web/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-221
Java/Kotlin
java/overly-general-catch
Overly-general catch clause
CWE-221
JavaScript/TypeScript
js/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-221
Python
py/catch-base-exception
Except block handles 'BaseException'
CWE-227
C/C++
cpp/double-free
Potential double free
CWE-227
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-227
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-227
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-227
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-227
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-227
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-227
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-227
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-227
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-227
C/C++
cpp/twice-locked
Mutex locked twice
CWE-227
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-227
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-227
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-227
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-227
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-227
C/C++
cpp/double-release
Errors When Double Release
CWE-227
C#
cs/inconsistent-equals-and-gethashcode
Inconsistent Equals(object) and GetHashCode()
CWE-227
C#
cs/invalid-dynamic-call
Bad dynamic call
CWE-227
C#
cs/web/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-227
Java/Kotlin
java/ejb/container-interference
EJB interferes with container operation
CWE-227
Java/Kotlin
java/ejb/file-io
EJB uses file input/output
CWE-227
Java/Kotlin
java/ejb/graphics
EJB uses graphics
CWE-227
Java/Kotlin
java/ejb/native-code
EJB uses native code
CWE-227
Java/Kotlin
java/ejb/reflection
EJB uses reflection
CWE-227
Java/Kotlin
java/ejb/security-configuration-access
EJB accesses security configuration
CWE-227
Java/Kotlin
java/ejb/substitution-in-serialization
EJB uses substitution in serialization
CWE-227
Java/Kotlin
java/ejb/socket-or-stream-handler-factory
EJB sets socket factory or URL stream handler factory
CWE-227
Java/Kotlin
java/ejb/server-socket
EJB uses server socket
CWE-227
Java/Kotlin
java/ejb/non-final-static-field
EJB uses non-final static field
CWE-227
Java/Kotlin
java/ejb/synchronization
EJB uses synchronization
CWE-227
Java/Kotlin
java/ejb/this
EJB uses 'this' as argument or result
CWE-227
Java/Kotlin
java/ejb/threads
EJB uses threads
CWE-227
Java/Kotlin
java/missing-call-to-super-clone
Missing super clone
CWE-227
Java/Kotlin
java/inconsistent-equals-and-hashcode
Inconsistent equals and hashCode
CWE-227
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-227
Java/Kotlin
java/missing-super-finalize
Finalizer inconsistency
CWE-227
Java/Kotlin
java/missing-format-argument
Missing format argument
CWE-227
Java/Kotlin
java/unused-format-argument
Unused format argument
CWE-227
Java/Kotlin
java/static-initialization-vector
Using a static initialization vector for encryption
CWE-227
Java/Kotlin
java/empty-finalizer
Empty body of finalizer
CWE-227
Java/Kotlin
java/do-not-call-finalize
Do not call finalize()
CWE-227
JavaScript/TypeScript
js/superfluous-trailing-arguments
Superfluous trailing arguments
CWE-227
JavaScript/TypeScript
js/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-227
Python
py/equals-hash-mismatch
Inconsistent equality and hashing
CWE-227
Python
py/call/wrong-named-class-argument
Wrong name for an argument in a class instantiation
CWE-227
Python
py/call/wrong-number-class-arguments
Wrong number of arguments in a class instantiation
CWE-227
Python
py/super-not-enclosing-class
First argument to super() is not enclosing class
CWE-227
Python
py/call/wrong-named-argument
Wrong name for an argument in a call
CWE-227
Python
py/percent-format/wrong-arguments
Wrong number of arguments for format
CWE-227
Python
py/call/wrong-arguments
Wrong number of arguments in a call
CWE-227
Swift
swift/static-initialization-vector
Static initialization vector for encryption
CWE-228
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-228
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-233
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-233
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-234
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-234
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-242
C/C++
cpp/dangerous-function-overflow
Use of dangerous function
CWE-243
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-247
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-247
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-248
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-248
C#
cs/web/missing-global-error-handler
Missing global error handler
CWE-248
Go
go/redundant-recover
Redundant call to recover
CWE-248
Java/Kotlin
java/uncaught-number-format-exception
Missing catch of NumberFormatException
CWE-248
Java/Kotlin
java/uncaught-servlet-exception
Uncaught Servlet Exception
CWE-248
JavaScript/TypeScript
js/server-crash
Server crash
CWE-250
JavaScript/TypeScript
js/remote-property-injection
Remote property injection
CWE-250
JavaScript/TypeScript
js/remote-property-injection-more-sources
Remote property injection with additional heuristic sources
CWE-252
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-252
C/C++
cpp/return-value-ignored
Return value of a function is ignored
CWE-252
C/C++
cpp/inconsistent-call-on-result
Inconsistent operation on return value
CWE-252
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-252
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-252
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-252
C#
cs/unchecked-return-value
Unchecked return value
CWE-252
Go
go/missing-error-check
Missing error check
CWE-252
Go
go/unhandled-writable-file-close
Writable file handle closed without error handling
CWE-252
Java/Kotlin
java/inconsistent-call-on-result
Inconsistent operation on return value
CWE-252
Java/Kotlin
java/return-value-ignored
Method result ignored
CWE-252
Python
py/ignored-return-value
Ignored return value
CWE-253
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-253
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-253
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-253
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-256
C#
cs/password-in-configuration
Password in configuration file
CWE-256
Java/Kotlin
java/credentials-in-properties
Cleartext Credentials in Properties File
CWE-256
Java/Kotlin
java/password-in-configuration
Password in configuration file
CWE-256
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-258
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-258
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-259
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-259
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-259
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-259
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-259
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-259
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-259
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-259
Swift
swift/constant-password
Constant password
CWE-260
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-260
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-260
C#
cs/password-in-configuration
Password in configuration file
CWE-260
Java/Kotlin
java/credentials-in-properties
Cleartext Credentials in Properties File
CWE-260
Java/Kotlin
java/password-in-configuration
Password in configuration file
CWE-260
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-260
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-266
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-266
Java/Kotlin
java/android/intent-uri-permission-manipulation
Intent URI permission manipulation
CWE-269
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-269
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-269
Java/Kotlin
java/android/intent-uri-permission-manipulation
Intent URI permission manipulation
CWE-269
Java/Kotlin
java/unsafe-cert-trust
Unsafe certificate trust
CWE-269
JavaScript/TypeScript
js/remote-property-injection
Remote property injection
CWE-269
JavaScript/TypeScript
js/remote-property-injection-more-sources
Remote property injection with additional heuristic sources
CWE-271
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-271
Java/Kotlin
java/unsafe-cert-trust
Unsafe certificate trust
CWE-273
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-273
Java/Kotlin
java/unsafe-cert-trust
Unsafe certificate trust
CWE-284
GitHub Actions
actions/improper-access-control
Improper Access Control
CWE-284
GitHub Actions
actions/pr-on-self-hosted-runner
Pull Request code execution on self-hosted runner
CWE-284
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-284
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-284
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-284
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-284
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-284
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-284
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-284
C/C++
cpp/pam-auth-bypass
PAM Authorization bypass
CWE-284
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-284
C#
cs/password-in-configuration
Password in configuration file
CWE-284
C#
cs/web/missing-function-level-access-control
Missing function level access control
CWE-284
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-284
C#
cs/session-reuse
Failure to abandon session
CWE-284
C#
cs/web/insecure-direct-object-reference
Insecure Direct Object Reference
CWE-284
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-284
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-284
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-284
C#
cs/web/broad-cookie-domain
Cookie security: overly broad domain
CWE-284
C#
cs/web/broad-cookie-path
Cookie security: overly broad path
CWE-284
Go
go/insecure-hostkeycallback
Use of insecure HostKeyCallback implementation
CWE-284
Go
go/email-injection
Email content injection
CWE-284
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-284
Go
go/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-284
Go
go/improper-ldap-auth
Improper LDAP Authentication
CWE-284
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-284
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-284
Go
go/cors-misconfiguration
CORS misconfiguration
CWE-284
Java/Kotlin
java/local-temp-file-or-directory-information-disclosure
Local information disclosure in a temporary directory
CWE-284
Java/Kotlin
java/android/intent-uri-permission-manipulation
Intent URI permission manipulation
CWE-284
Java/Kotlin
java/unsafe-cert-trust
Unsafe certificate trust
CWE-284
Java/Kotlin
java/android/insecure-local-key-gen
Insecurely generated keys for local authentication
CWE-284
Java/Kotlin
java/android/insecure-local-authentication
Insecure local authentication
CWE-284
Java/Kotlin
java/insecure-smtp-ssl
Insecure JavaMail SSL Configuration
CWE-284
Java/Kotlin
java/unsafe-hostname-verification
Unsafe hostname verification
CWE-284
Java/Kotlin
java/socket-auth-race-condition
Race condition in socket authentication
CWE-284
Java/Kotlin
java/insecure-basic-auth
Insecure basic authentication
CWE-284
Java/Kotlin
java/insecure-ldap-auth
Insecure LDAP authentication
CWE-284
Java/Kotlin
java/world-writable-file-read
Reading from a world writable file
CWE-284
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-284
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-284
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-284
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-284
Java/Kotlin
java/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-284
Java/Kotlin
java/tainted-permissions-check
User-controlled data used in permissions check
CWE-284
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-284
Java/Kotlin
java/improper-intent-verification
Improper verification of intent by broadcast receiver
CWE-284
Java/Kotlin
java/android/incomplete-provider-permissions
Missing read or write permission in a content provider
CWE-284
Java/Kotlin
java/android/implicitly-exported-component
Implicitly exported Android component
CWE-284
Java/Kotlin
java/android/implicit-pendingintents
Use of implicit PendingIntents
CWE-284
Java/Kotlin
java/android/sensitive-communication
Leaking sensitive information through an implicit Intent
CWE-284
Java/Kotlin
java/android/sensitive-result-receiver
Leaking sensitive information through a ResultReceiver
CWE-284
Java/Kotlin
java/android/intent-redirection
Android Intent redirection
CWE-284
Java/Kotlin
java/ignored-hostname-verification
Ignored result of hostname verification
CWE-284
Java/Kotlin
java/insecure-ldaps-endpoint
Insecure LDAPS Endpoint Configuration
CWE-284
Java/Kotlin
java/unvalidated-cors-origin-set
CORS is derived from untrusted input
CWE-284
Java/Kotlin
java/credentials-in-properties
Cleartext Credentials in Properties File
CWE-284
Java/Kotlin
java/password-in-configuration
Password in configuration file
CWE-284
Java/Kotlin
java/permissive-dot-regex
URL matched by permissive . in a regular expression
CWE-284
Java/Kotlin
java/incorrect-url-verification
Incorrect URL verification
CWE-284
JavaScript/TypeScript
js/missing-origin-check
Missing origin verification in postMessage handler
CWE-284
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-284
JavaScript/TypeScript
js/disabling-certificate-validation
Disabling certificate validation
CWE-284
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-284
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-284
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-284
JavaScript/TypeScript
js/session-fixation
Failure to abandon session
CWE-284
JavaScript/TypeScript
js/remote-property-injection
Remote property injection
CWE-284
JavaScript/TypeScript
js/host-header-forgery-in-email-generation
Host header poisoning in email generation
CWE-284
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-284
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-284
JavaScript/TypeScript
js/user-controlled-bypass
User-controlled bypass of security check
CWE-284
JavaScript/TypeScript
js/different-kinds-comparison-bypass
Comparison of user-controlled data of different kinds
CWE-284
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-284
JavaScript/TypeScript
js/cors-permissive-configuration
Permissive CORS configuration
CWE-284
JavaScript/TypeScript
js/user-controlled-data-decompression
User-controlled file decompression
CWE-284
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-284
JavaScript/TypeScript
js/remote-property-injection-more-sources
Remote property injection with additional heuristic sources
CWE-284
JavaScript/TypeScript
js/user-controlled-bypass-more-sources
User-controlled bypass of security check with additional heuristic sources
CWE-284
Python
py/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-284
Python
py/overly-permissive-file
Overly permissive file permissions
CWE-284
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-284
Python
py/flask-constant-secret-key
Initializing SECRET_KEY of Flask application with Constant value
CWE-284
Python
py/improper-ldap-auth
Improper LDAP Authentication
CWE-284
Python
py/insecure-ldap-auth
Python Insecure LDAP Authentication
CWE-284
Python
py/cors-misconfiguration-with-credentials
Cors misconfiguration with credentials
CWE-284
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-284
Ruby
rb/improper-ldap-auth
Improper LDAP Authentication
CWE-284
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-284
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-284
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-284
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-284
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-284
Swift
swift/constant-password
Constant password
CWE-284
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-285
GitHub Actions
actions/improper-access-control
Improper Access Control
CWE-285
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-285
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-285
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-285
C/C++
cpp/pam-auth-bypass
PAM Authorization bypass
CWE-285
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-285
C#
cs/web/missing-function-level-access-control
Missing function level access control
CWE-285
C#
cs/web/insecure-direct-object-reference
Insecure Direct Object Reference
CWE-285
Go
go/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-285
Java/Kotlin
java/local-temp-file-or-directory-information-disclosure
Local information disclosure in a temporary directory
CWE-285
Java/Kotlin
java/android/intent-uri-permission-manipulation
Intent URI permission manipulation
CWE-285
Java/Kotlin
java/world-writable-file-read
Reading from a world writable file
CWE-285
Java/Kotlin
java/android/incomplete-provider-permissions
Missing read or write permission in a content provider
CWE-285
Java/Kotlin
java/android/implicitly-exported-component
Implicitly exported Android component
CWE-285
Java/Kotlin
java/android/implicit-pendingintents
Use of implicit PendingIntents
CWE-285
Java/Kotlin
java/android/sensitive-communication
Leaking sensitive information through an implicit Intent
CWE-285
Java/Kotlin
java/android/sensitive-result-receiver
Leaking sensitive information through a ResultReceiver
CWE-285
Java/Kotlin
java/android/intent-redirection
Android Intent redirection
CWE-285
Java/Kotlin
java/permissive-dot-regex
URL matched by permissive . in a regular expression
CWE-285
Java/Kotlin
java/incorrect-url-verification
Incorrect URL verification
CWE-285
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-285
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-285
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-285
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-285
Python
py/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-285
Python
py/overly-permissive-file
Overly permissive file permissions
CWE-285
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-285
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-287
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-287
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-287
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-287
C#
cs/password-in-configuration
Password in configuration file
CWE-287
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-287
C#
cs/session-reuse
Failure to abandon session
CWE-287
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-287
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-287
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-287
C#
cs/web/broad-cookie-domain
Cookie security: overly broad domain
CWE-287
C#
cs/web/broad-cookie-path
Cookie security: overly broad path
CWE-287
Go
go/email-injection
Email content injection
CWE-287
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-287
Go
go/improper-ldap-auth
Improper LDAP Authentication
CWE-287
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-287
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-287
Java/Kotlin
java/android/insecure-local-key-gen
Insecurely generated keys for local authentication
CWE-287
Java/Kotlin
java/android/insecure-local-authentication
Insecure local authentication
CWE-287
Java/Kotlin
java/insecure-basic-auth
Insecure basic authentication
CWE-287
Java/Kotlin
java/insecure-ldap-auth
Insecure LDAP authentication
CWE-287
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-287
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-287
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-287
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-287
Java/Kotlin
java/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-287
Java/Kotlin
java/tainted-permissions-check
User-controlled data used in permissions check
CWE-287
Java/Kotlin
java/credentials-in-properties
Cleartext Credentials in Properties File
CWE-287
Java/Kotlin
java/password-in-configuration
Password in configuration file
CWE-287
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-287
JavaScript/TypeScript
js/session-fixation
Failure to abandon session
CWE-287
JavaScript/TypeScript
js/host-header-forgery-in-email-generation
Host header poisoning in email generation
CWE-287
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-287
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-287
JavaScript/TypeScript
js/user-controlled-bypass
User-controlled bypass of security check
CWE-287
JavaScript/TypeScript
js/different-kinds-comparison-bypass
Comparison of user-controlled data of different kinds
CWE-287
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-287
JavaScript/TypeScript
js/user-controlled-data-decompression
User-controlled file decompression
CWE-287
JavaScript/TypeScript
js/user-controlled-bypass-more-sources
User-controlled bypass of security check with additional heuristic sources
CWE-287
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-287
Python
py/flask-constant-secret-key
Initializing SECRET_KEY of Flask application with Constant value
CWE-287
Python
py/improper-ldap-auth
Improper LDAP Authentication
CWE-287
Python
py/insecure-ldap-auth
Python Insecure LDAP Authentication
CWE-287
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-287
Ruby
rb/improper-ldap-auth
Improper LDAP Authentication
CWE-287
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-287
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-287
Swift
swift/constant-password
Constant password
CWE-287
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-290
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-290
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-290
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-290
Java/Kotlin
java/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-290
Java/Kotlin
java/tainted-permissions-check
User-controlled data used in permissions check
CWE-290
JavaScript/TypeScript
js/user-controlled-bypass
User-controlled bypass of security check
CWE-290
JavaScript/TypeScript
js/different-kinds-comparison-bypass
Comparison of user-controlled data of different kinds
CWE-290
JavaScript/TypeScript
js/user-controlled-bypass-more-sources
User-controlled bypass of security check with additional heuristic sources
CWE-290
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-295
C/C++
cpp/certificate-result-conflation
Certificate result conflation
CWE-295
C/C++
cpp/certificate-not-checked
Certificate not checked
CWE-295
C/C++
cpp/curl-disabled-ssl
Disabled certifcate verification
CWE-295
Go
go/disabled-certificate-check
Disabled TLS certificate check
CWE-295
Java/Kotlin
java/android/missing-certificate-pinning
Android missing certificate pinning
CWE-295
Java/Kotlin
java/improper-webview-certificate-validation
Android WebView that accepts all certificates
CWE-295
Java/Kotlin
java/insecure-trustmanager
TrustManager that accepts all certificates
CWE-295
Java/Kotlin
java/insecure-smtp-ssl
Insecure JavaMail SSL Configuration
CWE-295
Java/Kotlin
java/unsafe-hostname-verification
Unsafe hostname verification
CWE-295
Java/Kotlin
java/jxbrowser/disabled-certificate-validation
JxBrowser with disabled certificate validation
CWE-295
Java/Kotlin
java/ignored-hostname-verification
Ignored result of hostname verification
CWE-295
Java/Kotlin
java/insecure-ldaps-endpoint
Insecure LDAPS Endpoint Configuration
CWE-295
Java/Kotlin
java/disabled-certificate-revocation-checking
Disabled certificate revocation checking
CWE-295
JavaScript/TypeScript
js/disabling-certificate-validation
Disabling certificate validation
CWE-295
Python
py/paramiko-missing-host-key-validation
Accepting unknown SSH host keys when using Paramiko
CWE-295
Python
py/request-without-cert-validation
Request without certificate validation
CWE-295
Ruby
rb/request-without-cert-validation
Request without certificate validation
CWE-295
Rust
rust/disabled-certificate-check
Disabled TLS certificate check
CWE-297
Java/Kotlin
java/insecure-smtp-ssl
Insecure JavaMail SSL Configuration
CWE-297
Java/Kotlin
java/unsafe-hostname-verification
Unsafe hostname verification
CWE-297
Java/Kotlin
java/ignored-hostname-verification
Ignored result of hostname verification
CWE-297
Java/Kotlin
java/insecure-ldaps-endpoint
Insecure LDAPS Endpoint Configuration
CWE-297
JavaScript/TypeScript
js/disabling-certificate-validation
Disabling certificate validation
CWE-299
Java/Kotlin
java/disabled-certificate-revocation-checking
Disabled certificate revocation checking
CWE-300
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-300
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-300
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-307
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-311
GitHub Actions
actions/excessive-secrets-exposure
Excessive Secrets Exposure
CWE-311
GitHub Actions
actions/secrets-in-artifacts
Storage of sensitive information in GitHub Actions artifact
CWE-311
GitHub Actions
actions/unmasked-secret-exposure
Unmasked Secret Exposure
CWE-311
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-311
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-311
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-311
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-311
C/C++
cpp/non-https-url
Failure to use HTTPS URLs
CWE-311
C#
cs/password-in-configuration
Password in configuration file
CWE-311
C#
cs/cleartext-storage-of-sensitive-information
Clear text storage of sensitive information
CWE-311
C#
cs/web/cookie-secure-not-set
Cookie 'Secure' attribute is not set to true
CWE-311
C#
cs/web/requiressl-not-set
'requireSSL' attribute is not set to true
CWE-311
Go
go/clear-text-logging
Clear-text logging of sensitive information
CWE-311
Go
go/cookie-secure-not-set
Cookie 'Secure' attribute is not set to true
CWE-311
Java/Kotlin
java/android/backup-enabled
Application backup allowed
CWE-311
Java/Kotlin
java/android/cleartext-storage-database
Cleartext storage of sensitive information using a local database on Android
CWE-311
Java/Kotlin
java/android/cleartext-storage-filesystem
Cleartext storage of sensitive information in the Android filesystem
CWE-311
Java/Kotlin
java/cleartext-storage-in-class
Cleartext storage of sensitive information using storable class
CWE-311
Java/Kotlin
java/cleartext-storage-in-cookie
Cleartext storage of sensitive information in cookie
CWE-311
Java/Kotlin
java/cleartext-storage-in-properties
Cleartext storage of sensitive information using 'Properties' class
CWE-311
Java/Kotlin
java/android/cleartext-storage-shared-prefs
Cleartext storage of sensitive information using SharedPreferences on Android
CWE-311
Java/Kotlin
java/non-https-url
Failure to use HTTPS URLs
CWE-311
Java/Kotlin
java/non-ssl-connection
Failure to use SSL
CWE-311
Java/Kotlin
java/non-ssl-socket-factory
Failure to use SSL socket factories
CWE-311
Java/Kotlin
java/insecure-basic-auth
Insecure basic authentication
CWE-311
Java/Kotlin
java/insecure-ldap-auth
Insecure LDAP authentication
CWE-311
Java/Kotlin
java/insecure-cookie
Failure to use secure cookies
CWE-311
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-311
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-311
JavaScript/TypeScript
js/build-artifact-leak
Storage of sensitive information in build artifact
CWE-311
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-311
JavaScript/TypeScript
js/clear-text-storage-of-sensitive-data
Clear text storage of sensitive information
CWE-311
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-311
JavaScript/TypeScript
js/clear-text-cookie
Clear text transmission of sensitive cookie
CWE-311
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-311
Python
py/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-311
Python
py/insecure-cookie
Failure to use secure cookies
CWE-311
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-311
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-311
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-311
Rust
rust/cleartext-transmission
Cleartext transmission of sensitive information
CWE-311
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-311
Rust
rust/cleartext-storage-database
Cleartext storage of sensitive information in a database
CWE-311
Rust
rust/non-https-url
Failure to use HTTPS URLs
CWE-311
Rust
rust/insecure-cookie
'Secure' attribute is not set to true
CWE-311
Swift
swift/cleartext-storage-database
Cleartext storage of sensitive information in a local database
CWE-311
Swift
swift/cleartext-transmission
Cleartext transmission of sensitive information
CWE-311
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-311
Swift
swift/cleartext-storage-preferences
Cleartext storage of sensitive information in an application preference store
CWE-312
GitHub Actions
actions/excessive-secrets-exposure
Excessive Secrets Exposure
CWE-312
GitHub Actions
actions/secrets-in-artifacts
Storage of sensitive information in GitHub Actions artifact
CWE-312
GitHub Actions
actions/unmasked-secret-exposure
Unmasked Secret Exposure
CWE-312
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-312
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-312
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-312
C#
cs/password-in-configuration
Password in configuration file
CWE-312
C#
cs/cleartext-storage-of-sensitive-information
Clear text storage of sensitive information
CWE-312
Go
go/clear-text-logging
Clear-text logging of sensitive information
CWE-312
Java/Kotlin
java/android/backup-enabled
Application backup allowed
CWE-312
Java/Kotlin
java/android/cleartext-storage-database
Cleartext storage of sensitive information using a local database on Android
CWE-312
Java/Kotlin
java/android/cleartext-storage-filesystem
Cleartext storage of sensitive information in the Android filesystem
CWE-312
Java/Kotlin
java/cleartext-storage-in-class
Cleartext storage of sensitive information using storable class
CWE-312
Java/Kotlin
java/cleartext-storage-in-cookie
Cleartext storage of sensitive information in cookie
CWE-312
Java/Kotlin
java/cleartext-storage-in-properties
Cleartext storage of sensitive information using 'Properties' class
CWE-312
Java/Kotlin
java/android/cleartext-storage-shared-prefs
Cleartext storage of sensitive information using SharedPreferences on Android
CWE-312
JavaScript/TypeScript
js/build-artifact-leak
Storage of sensitive information in build artifact
CWE-312
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-312
JavaScript/TypeScript
js/clear-text-storage-of-sensitive-data
Clear text storage of sensitive information
CWE-312
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-312
JavaScript/TypeScript
js/clear-text-cookie
Clear text transmission of sensitive cookie
CWE-312
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-312
Python
py/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-312
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-312
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-312
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-312
Rust
rust/cleartext-storage-database
Cleartext storage of sensitive information in a database
CWE-312
Swift
swift/cleartext-storage-database
Cleartext storage of sensitive information in a local database
CWE-312
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-312
Swift
swift/cleartext-storage-preferences
Cleartext storage of sensitive information in an application preference store
CWE-313
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-313
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-313
C#
cs/password-in-configuration
Password in configuration file
CWE-313
Java/Kotlin
java/cleartext-storage-in-properties
Cleartext storage of sensitive information using 'Properties' class
CWE-313
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-315
C#
cs/cleartext-storage-of-sensitive-information
Clear text storage of sensitive information
CWE-315
Go
go/clear-text-logging
Clear-text logging of sensitive information
CWE-315
Java/Kotlin
java/cleartext-storage-in-cookie
Cleartext storage of sensitive information in cookie
CWE-315
JavaScript/TypeScript
js/build-artifact-leak
Storage of sensitive information in build artifact
CWE-315
JavaScript/TypeScript
js/clear-text-storage-of-sensitive-data
Clear text storage of sensitive information
CWE-315
Python
py/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-319
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-319
C/C++
cpp/non-https-url
Failure to use HTTPS URLs
CWE-319
C#
cs/web/cookie-secure-not-set
Cookie 'Secure' attribute is not set to true
CWE-319
C#
cs/web/requiressl-not-set
'requireSSL' attribute is not set to true
CWE-319
Java/Kotlin
java/non-https-url
Failure to use HTTPS URLs
CWE-319
Java/Kotlin
java/non-ssl-connection
Failure to use SSL
CWE-319
Java/Kotlin
java/non-ssl-socket-factory
Failure to use SSL socket factories
CWE-319
Java/Kotlin
java/insecure-basic-auth
Insecure basic authentication
CWE-319
Java/Kotlin
java/insecure-ldap-auth
Insecure LDAP authentication
CWE-319
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-319
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-319
JavaScript/TypeScript
js/clear-text-cookie
Clear text transmission of sensitive cookie
CWE-319
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-319
Rust
rust/cleartext-transmission
Cleartext transmission of sensitive information
CWE-319
Rust
rust/non-https-url
Failure to use HTTPS URLs
CWE-319
Rust
rust/insecure-cookie
'Secure' attribute is not set to true
CWE-319
Swift
swift/cleartext-transmission
Cleartext transmission of sensitive information
CWE-321
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-321
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-321
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-321
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-321
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-321
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-321
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-321
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-321
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-321
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-322
Go
go/insecure-hostkeycallback
Use of insecure HostKeyCallback implementation
CWE-326
C/C++
cpp/boost/tls-settings-misconfiguration
boost::asio TLS settings misconfiguration
CWE-326
C/C++
cpp/insufficient-key-size
Use of a cryptographic algorithm with insufficient key size
CWE-326
C/C++
cpp/unknown-asymmetric-key-gen-size
Unknown key generation key size
CWE-326
C/C++
cpp/weak-asymmetric-key-gen-size
Weak asymmetric key generation key size (< 2048 bits)
CWE-326
C#
cs/insufficient-key-size
Weak encryption: Insufficient key size
CWE-326
Go
go/weak-crypto-key
Use of a weak cryptographic key
CWE-326
Go
go/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-326
Go
go/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-326
Java/Kotlin
java/insufficient-key-size
Use of a cryptographic algorithm with insufficient key size
CWE-326
Java/Kotlin
java/weak-cryptographic-algorithm
Use of a broken or risky cryptographic algorithm
CWE-326
Java/Kotlin
java/potentially-weak-cryptographic-algorithm
Use of a potentially broken or risky cryptographic algorithm
CWE-326
Java/Kotlin
java/weak-cryptographic-algorithm-new-model
Use of a broken or risky cryptographic algorithm
CWE-326
JavaScript/TypeScript
js/insufficient-key-size
Use of a weak cryptographic key
CWE-326
JavaScript/TypeScript
js/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-326
Python
py/weak-crypto-key
Use of weak cryptographic key
CWE-326
Python
py/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-326
Python
py/unknown-asymmetric-key-gen-size
Unknown key generation key size
CWE-326
Python
py/weak-asymmetric-key-gen-size
Weak key generation key size (< 2048 bits)
CWE-326
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-326
Rust
rust/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-326
Swift
swift/weak-password-hashing
Use of an inappropriate cryptographic hashing algorithm on passwords
CWE-326
Swift
swift/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-327
C/C++
cpp/boost/use-of-deprecated-hardcoded-security-protocol
boost::asio use of deprecated hardcoded protocol
CWE-327
C/C++
cpp/weak-cryptographic-algorithm
Use of a broken or risky cryptographic algorithm
CWE-327
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-327
C/C++
cpp/weak-block-mode
Weak block mode
CWE-327
C/C++
cpp/weak-elliptic-curve
Weak elliptic curve
CWE-327
C/C++
cpp/weak-crypto/banned-encryption-algorithms
Weak cryptography
CWE-327
C/C++
cpp/weak-crypto/banned-hash-algorithms
Weak cryptography
CWE-327
C#
cs/adding-cert-to-root-store
Do not add certificates to the system root store
CWE-327
C#
cs/insecure-sql-connection
Insecure SQL connection
CWE-327
C#
cs/ecb-encryption
Encryption using ECB
CWE-327
C#
cs/inadequate-rsa-padding
Weak encryption: inadequate RSA padding
CWE-327
C#
cs/weak-encryption
Weak encryption
CWE-327
C#
cs/azure-storage/unsafe-usage-of-client-side-encryption-version
Unsafe usage of v1 version of Azure Storage client-side encryption (CVE-2022-30187)
CWE-327
C#
cs/hash-without-salt
Use of a hash function without a salt
CWE-327
Go
go/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-327
Go
go/insecure-tls
Insecure TLS configuration
CWE-327
Go
go/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-327
Java/Kotlin
java/weak-cryptographic-algorithm
Use of a broken or risky cryptographic algorithm
CWE-327
Java/Kotlin
java/potentially-weak-cryptographic-algorithm
Use of a potentially broken or risky cryptographic algorithm
CWE-327
Java/Kotlin
java/rsa-without-oaep
Use of RSA algorithm without OAEP
CWE-327
Java/Kotlin
java/azure-storage/unsafe-client-side-encryption-in-use
Unsafe usage of v1 version of Azure Storage client-side encryption (CVE-2022-30187)
CWE-327
Java/Kotlin
java/unsafe-tls-version
Unsafe TLS version
CWE-327
Java/Kotlin
java/hash-without-salt
Use of a hash function without a salt
CWE-327
Java/Kotlin
java/weak-cryptographic-algorithm-new-model
Use of a broken or risky cryptographic algorithm
CWE-327
Java/Kotlin
java/quantum/examples/weak-hash
Weak hashes
CWE-327
Java/Kotlin
java/quantum/examples/weak-ciphers
Weak symmetric ciphers
CWE-327
JavaScript/TypeScript
js/biased-cryptographic-random
Creating biased random numbers from a cryptographically secure source
CWE-327
JavaScript/TypeScript
js/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-327
JavaScript/TypeScript
js/insufficient-password-hash
Use of password hash with insufficient computational effort
CWE-327
Python
py/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-327
Python
py/insecure-default-protocol
Default version of SSL/TLS may be insecure
CWE-327
Python
py/insecure-protocol
Use of insecure SSL/TLS version
CWE-327
Python
py/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-327
Python
py/azure-storage/unsafe-client-side-encryption-in-use
Unsafe usage of v1 version of Azure Storage client-side encryption
CWE-327
Python
py/weak-block-mode
Weak block mode
CWE-327
Python
py/weak-elliptic-curve
Weak elliptic curve
CWE-327
Python
py/weak-hashes
Weak hashes
CWE-327
Python
py/weak-symmetric-encryption
Weak symmetric encryption algorithm
CWE-327
Ruby
rb/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-327
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-327
Rust
rust/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-327
Rust
rust/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-327
Swift
swift/ecb-encryption
Encryption using ECB
CWE-327
Swift
swift/weak-password-hashing
Use of an inappropriate cryptographic hashing algorithm on passwords
CWE-327
Swift
swift/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-327
Swift
swift/constant-salt
Use of constant salts
CWE-327
Swift
swift/insufficient-hash-iterations
Insufficient hash iterations
CWE-328
Go
go/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-328
Go
go/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-328
Java/Kotlin
java/weak-cryptographic-algorithm
Use of a broken or risky cryptographic algorithm
CWE-328
Java/Kotlin
java/potentially-weak-cryptographic-algorithm
Use of a potentially broken or risky cryptographic algorithm
CWE-328
Java/Kotlin
java/weak-cryptographic-algorithm-new-model
Use of a broken or risky cryptographic algorithm
CWE-328
JavaScript/TypeScript
js/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-328
Python
py/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-328
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-328
Rust
rust/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-328
Swift
swift/weak-password-hashing
Use of an inappropriate cryptographic hashing algorithm on passwords
CWE-328
Swift
swift/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-329
Java/Kotlin
java/static-initialization-vector
Using a static initialization vector for encryption
CWE-329
Swift
swift/static-initialization-vector
Static initialization vector for encryption
CWE-330
C#
cs/random-used-once
Random used only once
CWE-330
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-330
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-330
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-330
C#
cs/insecure-randomness
Insecure randomness
CWE-330
Go
go/insecure-randomness
Use of insufficient randomness as the key of a cryptographic algorithm
CWE-330
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-330
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-330
Java/Kotlin
java/random-used-once
Random used only once
CWE-330
Java/Kotlin
java/static-initialization-vector
Using a static initialization vector for encryption
CWE-330
Java/Kotlin
java/insecure-randomness
Insecure randomness
CWE-330
Java/Kotlin
java/predictable-seed
Use of a predictable seed in a secure random number generator
CWE-330
Java/Kotlin
java/jhipster-prng
Detect JHipster Generator Vulnerability CVE-2019-16303
CWE-330
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-330
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-330
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-330
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-330
JavaScript/TypeScript
js/insecure-randomness
Insecure randomness
CWE-330
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-330
JavaScript/TypeScript
js/predictable-token
Predictable token
CWE-330
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-330
Python
py/insecure-randomness
Insecure randomness
CWE-330
Python
py/predictable-token
Predictable token
CWE-330
Ruby
rb/insecure-randomness
Insecure randomness
CWE-330
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-330
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-330
Swift
swift/static-initialization-vector
Static initialization vector for encryption
CWE-330
Swift
swift/constant-password
Constant password
CWE-330
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-335
C#
cs/random-used-once
Random used only once
CWE-335
Java/Kotlin
java/random-used-once
Random used only once
CWE-335
Java/Kotlin
java/predictable-seed
Use of a predictable seed in a secure random number generator
CWE-337
Java/Kotlin
java/predictable-seed
Use of a predictable seed in a secure random number generator
CWE-338
C#
cs/insecure-randomness
Insecure randomness
CWE-338
Go
go/insecure-randomness
Use of insufficient randomness as the key of a cryptographic algorithm
CWE-338
Java/Kotlin
java/insecure-randomness
Insecure randomness
CWE-338
Java/Kotlin
java/jhipster-prng
Detect JHipster Generator Vulnerability CVE-2019-16303
CWE-338
JavaScript/TypeScript
js/insecure-randomness
Insecure randomness
CWE-338
Python
py/insecure-randomness
Insecure randomness
CWE-338
Ruby
rb/insecure-randomness
Insecure randomness
CWE-340
JavaScript/TypeScript
js/predictable-token
Predictable token
CWE-340
Python
py/predictable-token
Predictable token
CWE-344
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-344
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-344
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-344
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-344
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-344
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-344
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-344
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-344
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-344
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-344
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-344
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-344
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-344
Swift
swift/constant-password
Constant password
CWE-344
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-345
GitHub Actions
actions/cache-poisoning/code-injection
Cache Poisoning via low-privileged code injection
CWE-345
GitHub Actions
actions/cache-poisoning/direct-cache
Cache Poisoning via caching of untrusted files
CWE-345
GitHub Actions
actions/cache-poisoning/poisonable-step
Cache Poisoning via execution of untrusted code
CWE-345
C/C++
cpp/non-https-url
Failure to use HTTPS URLs
CWE-345
C#
cs/web/ambiguous-client-variable
Value shadowing
CWE-345
C#
cs/web/ambiguous-server-variable
Value shadowing: server variable
CWE-345
C#
cs/web/missing-token-validation
Missing cross-site request forgery token validation
CWE-345
Go
go/missing-jwt-signature-check
Missing JWT signature check
CWE-345
Go
go/constant-oauth2-state
Use of constant state value in OAuth 2.0 URL
CWE-345
Go
go/cors-misconfiguration
CORS misconfiguration
CWE-345
Java/Kotlin
java/non-https-url
Failure to use HTTPS URLs
CWE-345
Java/Kotlin
java/missing-jwt-signature-check
Missing JWT signature check
CWE-345
Java/Kotlin
java/csrf-unprotected-request-type
HTTP request type unprotected from CSRF
CWE-345
Java/Kotlin
java/spring-disabled-csrf-protection
Disabled Spring CSRF protection
CWE-345
Java/Kotlin
java/unvalidated-cors-origin-set
CORS is derived from untrusted input
CWE-345
Java/Kotlin
java/missing-jwt-signature-check-auth0
Missing JWT signature check
CWE-345
Java/Kotlin
java/ip-address-spoofing
IP address spoofing
CWE-345
Java/Kotlin
java/jsonp-injection
JSONP Injection
CWE-345
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-345
JavaScript/TypeScript
js/jwt-missing-verification
JWT missing secret or public key verification
CWE-345
JavaScript/TypeScript
js/missing-token-validation
Missing CSRF middleware
CWE-345
JavaScript/TypeScript
js/decode-jwt-without-verification
JWT missing secret or public key verification
CWE-345
JavaScript/TypeScript
js/decode-jwt-without-verification-local-source
JWT missing secret or public key verification
CWE-345
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-345
Python
py/csrf-protection-disabled
CSRF protection weakened or disabled
CWE-345
Python
py/jwt-missing-verification
JWT missing secret or public key verification
CWE-345
Python
py/ip-address-spoofing
IP address spoofing
CWE-345
Ruby
rb/jwt-missing-verification
JWT missing secret or public key verification
CWE-345
Ruby
rb/csrf-protection-disabled
CSRF protection weakened or disabled
CWE-345
Ruby
rb/csrf-protection-not-enabled
CSRF protection not enabled
CWE-345
Rust
rust/non-https-url
Failure to use HTTPS URLs
CWE-346
Go
go/cors-misconfiguration
CORS misconfiguration
CWE-346
Java/Kotlin
java/unvalidated-cors-origin-set
CORS is derived from untrusted input
CWE-346
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-346
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-347
Go
go/missing-jwt-signature-check
Missing JWT signature check
CWE-347
Java/Kotlin
java/missing-jwt-signature-check
Missing JWT signature check
CWE-347
Java/Kotlin
java/missing-jwt-signature-check-auth0
Missing JWT signature check
CWE-347
JavaScript/TypeScript
js/jwt-missing-verification
JWT missing secret or public key verification
CWE-347
JavaScript/TypeScript
js/decode-jwt-without-verification
JWT missing secret or public key verification
CWE-347
JavaScript/TypeScript
js/decode-jwt-without-verification-local-source
JWT missing secret or public key verification
CWE-347
Python
py/jwt-missing-verification
JWT missing secret or public key verification
CWE-347
Ruby
rb/jwt-missing-verification
JWT missing secret or public key verification
CWE-348
C#
cs/web/ambiguous-client-variable
Value shadowing
CWE-348
C#
cs/web/ambiguous-server-variable
Value shadowing: server variable
CWE-348
Java/Kotlin
java/ip-address-spoofing
IP address spoofing
CWE-348
Python
py/ip-address-spoofing
IP address spoofing
CWE-349
GitHub Actions
actions/cache-poisoning/code-injection
Cache Poisoning via low-privileged code injection
CWE-349
GitHub Actions
actions/cache-poisoning/direct-cache
Cache Poisoning via caching of untrusted files
CWE-349
GitHub Actions
actions/cache-poisoning/poisonable-step
Cache Poisoning via execution of untrusted code
CWE-350
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-350
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-352
C#
cs/web/missing-token-validation
Missing cross-site request forgery token validation
CWE-352
Go
go/constant-oauth2-state
Use of constant state value in OAuth 2.0 URL
CWE-352
Java/Kotlin
java/csrf-unprotected-request-type
HTTP request type unprotected from CSRF
CWE-352
Java/Kotlin
java/spring-disabled-csrf-protection
Disabled Spring CSRF protection
CWE-352
Java/Kotlin
java/jsonp-injection
JSONP Injection
CWE-352
JavaScript/TypeScript
js/missing-token-validation
Missing CSRF middleware
CWE-352
Python
py/csrf-protection-disabled
CSRF protection weakened or disabled
CWE-352
Ruby
rb/csrf-protection-disabled
CSRF protection weakened or disabled
CWE-352
Ruby
rb/csrf-protection-not-enabled
CSRF protection not enabled
CWE-359
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-359
C/C++
cpp/private-cleartext-write
Exposure of private information
CWE-359
C#
cs/cleartext-storage-of-sensitive-information
Clear text storage of sensitive information
CWE-359
C#
cs/exposure-of-sensitive-information
Exposure of private information
CWE-359
Go
go/clear-text-logging
Clear-text logging of sensitive information
CWE-359
JavaScript/TypeScript
js/cross-window-information-leak
Cross-window communication with unrestricted target origin
CWE-359
JavaScript/TypeScript
js/build-artifact-leak
Storage of sensitive information in build artifact
CWE-359
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-359
JavaScript/TypeScript
js/clear-text-storage-of-sensitive-data
Clear text storage of sensitive information
CWE-359
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-359
Python
py/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-359
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-359
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-359
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-359
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-362
GitHub Actions
actions/untrusted-checkout-toctou/critical
Untrusted Checkout TOCTOU
CWE-362
GitHub Actions
actions/untrusted-checkout-toctou/high
Untrusted Checkout TOCTOU
CWE-362
C/C++
cpp/toctou-race-condition
Time-of-check time-of-use filesystem race condition
CWE-362
C/C++
cpp/linux-kernel-double-fetch-vulnerability
Linux kernel double-fetch vulnerability detection
CWE-362
C#
cs/unsafe-sync-on-field
Futile synchronization on field
CWE-362
C#
cs/unsynchronized-static-access
Unsynchronized access to static collection member in non-static context
CWE-362
C#
cs/thread-unsafe-icryptotransform-field-in-class
Thread-unsafe use of a static ICryptoTransform field
CWE-362
C#
cs/thread-unsafe-icryptotransform-captured-in-lambda
Thread-unsafe capturing of an ICryptoTransform object
CWE-362
Java/Kotlin
java/toctou-race-condition
Time-of-check time-of-use race condition
CWE-362
Java/Kotlin
java/socket-auth-race-condition
Race condition in socket authentication
CWE-362
JavaScript/TypeScript
js/file-system-race
Potential file system race condition
CWE-366
C#
cs/unsafe-sync-on-field
Futile synchronization on field
CWE-367
GitHub Actions
actions/untrusted-checkout-toctou/critical
Untrusted Checkout TOCTOU
CWE-367
GitHub Actions
actions/untrusted-checkout-toctou/high
Untrusted Checkout TOCTOU
CWE-367
C/C++
cpp/toctou-race-condition
Time-of-check time-of-use filesystem race condition
CWE-367
Java/Kotlin
java/toctou-race-condition
Time-of-check time-of-use race condition
CWE-367
JavaScript/TypeScript
js/file-system-race
Potential file system race condition
CWE-369
C/C++
cpp/divide-by-zero-using-return-value
Divide by zero using return value
CWE-369
Go
go/divide-by-zero
Divide by zero
CWE-377
C/C++
cpp/insecure-generation-of-filename
Insecure generation of filenames
CWE-377
JavaScript/TypeScript
js/insecure-temporary-file
Insecure temporary file
CWE-377
Python
py/insecure-temporary-file
Insecure temporary file
CWE-378
JavaScript/TypeScript
js/insecure-temporary-file
Insecure temporary file
CWE-382
Java/Kotlin
java/ejb/container-interference
EJB interferes with container operation
CWE-382
Java/Kotlin
java/jvm-exit
Forcible JVM termination
CWE-383
Java/Kotlin
java/ejb/threads
EJB uses threads
CWE-384
C#
cs/session-reuse
Failure to abandon session
CWE-384
JavaScript/TypeScript
js/session-fixation
Failure to abandon session
CWE-390
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-390
C#
cs/empty-catch-block
Poor error handling: empty catch block
CWE-390
Python
py/empty-except
Empty except
CWE-391
C#
cs/empty-catch-block
Poor error handling: empty catch block
CWE-391
Java/Kotlin
java/discarded-exception
Discarded exception
CWE-391
Java/Kotlin
java/ignored-error-status-of-call
Ignored error status of call
CWE-395
C#
cs/catch-nullreferenceexception
Poor error handling: catch of NullReferenceException
CWE-396
C#
cs/catch-of-all-exceptions
Generic catch clause
CWE-396
Java/Kotlin
java/overly-general-catch
Overly-general catch clause
CWE-396
Python
py/catch-base-exception
Except block handles 'BaseException'
CWE-398
C/C++
cpp/unused-local-variable
Unused local variable
CWE-398
C/C++
cpp/unused-static-function
Unused static function
CWE-398
C/C++
cpp/unused-static-variable
Unused static variable
CWE-398
C/C++
cpp/dead-code-condition
Branching condition always evaluates to same value
CWE-398
C/C++
cpp/dead-code-function
Function is never called
CWE-398
C/C++
cpp/dead-code-goto
Dead code due to goto or break statement
CWE-398
C/C++
cpp/inconsistent-nullness-testing
Inconsistent null check of pointer
CWE-398
C/C++
cpp/missing-null-test
Returned pointer not checked
CWE-398
C/C++
cpp/unused-variable
Variable is assigned a value that is never read
CWE-398
C/C++
cpp/fixme-comment
FIXME comment
CWE-398
C/C++
cpp/todo-comment
TODO comment
CWE-398
C/C++
cpp/inconsistent-null-check
Inconsistent nullness check
CWE-398
C/C++
cpp/useless-expression
Expression has no effect
CWE-398
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-398
C/C++
cpp/suspicious-call-to-memset
Suspicious call to memset
CWE-398
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-398
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-398
C/C++
cpp/redundant-null-check-simple
Redundant null check due to previous dereference
CWE-398
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-398
C/C++
cpp/dangerous-function-overflow
Use of dangerous function
CWE-398
C/C++
cpp/dangerous-cin
Dangerous use of 'cin'
CWE-398
C/C++
cpp/potentially-dangerous-function
Use of potentially dangerous function
CWE-398
C/C++
cpp/deref-null-result
Null dereference from a function result
CWE-398
C/C++
cpp/redundant-null-check-param
Redundant null check or missing null check of parameter
CWE-398
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-398
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-398
C#
cs/call-to-obsolete-method
Call to obsolete method
CWE-398
C#
cs/todo-comment
TODO comment
CWE-398
C#
cs/dereferenced-value-is-always-null
Dereferenced variable is always null
CWE-398
C#
cs/dereferenced-value-may-be-null
Dereferenced variable may be null
CWE-398
C#
cs/unused-reftype
Dead reference types
CWE-398
C#
cs/useless-assignment-to-local
Useless assignment to local variable
CWE-398
C#
cs/unused-field
Unused field
CWE-398
C#
cs/unused-method
Unused method
CWE-398
C#
cs/useless-cast-to-self
Cast to same type
CWE-398
C#
cs/useless-is-before-as
Useless 'is' before 'as'
CWE-398
C#
cs/coalesce-of-identical-expressions
Useless ?? expression
CWE-398
C#
cs/useless-type-test
Useless type test
CWE-398
C#
cs/useless-upcast
Useless upcast
CWE-398
C#
cs/empty-collection
Container contents are never initialized
CWE-398
C#
cs/unused-collection
Container contents are never accessed
CWE-398
C#
cs/empty-lock-statement
Empty lock statement
CWE-398
C#
cs/linq/useless-select
Redundant Select
CWE-398
Go
go/comparison-of-identical-expressions
Comparison of identical values
CWE-398
Go
go/useless-assignment-to-field
Useless assignment to field
CWE-398
Go
go/useless-assignment-to-local
Useless assignment to local variable
CWE-398
Go
go/duplicate-branches
Duplicate 'if' branches
CWE-398
Go
go/duplicate-condition
Duplicate 'if' condition
CWE-398
Go
go/duplicate-switch-case
Duplicate switch case
CWE-398
Go
go/useless-expression
Expression has no effect
CWE-398
Go
go/impossible-interface-nil-check
Impossible interface nil check
CWE-398
Go
go/negative-length-check
Redundant check for negative value
CWE-398
Go
go/redundant-operation
Identical operands
CWE-398
Go
go/redundant-assignment
Self assignment
CWE-398
Go
go/unreachable-statement
Unreachable statement
CWE-398
Go
go/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-398
Java/Kotlin
java/deprecated-call
Deprecated method or constructor invocation
CWE-398
Java/Kotlin
java/dead-class
Dead class
CWE-398
Java/Kotlin
java/dead-enum-constant
Dead enum constant
CWE-398
Java/Kotlin
java/dead-field
Dead field
CWE-398
Java/Kotlin
java/dead-function
Dead method
CWE-398
Java/Kotlin
java/lines-of-dead-code
Lines of dead code in files
CWE-398
Java/Kotlin
java/unused-parameter
Useless parameter
CWE-398
Java/Kotlin
java/useless-null-check
Useless null check
CWE-398
Java/Kotlin
java/useless-type-test
Useless type test
CWE-398
Java/Kotlin
java/useless-upcast
Useless upcast
CWE-398
Java/Kotlin
java/empty-container
Container contents are never initialized
CWE-398
Java/Kotlin
java/unused-container
Container contents are never accessed
CWE-398
Java/Kotlin
java/equals-on-unrelated-types
Equals on incomparable types
CWE-398
Java/Kotlin
java/constant-comparison
Useless comparison test
CWE-398
Java/Kotlin
java/dereferenced-value-is-always-null
Dereferenced variable is always null
CWE-398
Java/Kotlin
java/dereferenced-expr-may-be-null
Dereferenced expression may be null
CWE-398
Java/Kotlin
java/dereferenced-value-may-be-null
Dereferenced variable may be null
CWE-398
Java/Kotlin
java/empty-synchronized-block
Empty synchronized block
CWE-398
Java/Kotlin
java/unreachable-catch-clause
Unreachable catch clause
CWE-398
Java/Kotlin
java/potentially-dangerous-function
Use of a potentially dangerous function
CWE-398
Java/Kotlin
java/todo-comment
TODO/FIXME comments
CWE-398
Java/Kotlin
java/unused-reference-type
Unused classes and interfaces
CWE-398
Java/Kotlin
java/overwritten-assignment-to-local
Assigned value is overwritten
CWE-398
Java/Kotlin
java/useless-assignment-to-local
Useless assignment to local variable
CWE-398
Java/Kotlin
java/unused-initialized-local
Local variable is initialized but not used
CWE-398
Java/Kotlin
java/local-variable-is-never-read
Unread local variable
CWE-398
Java/Kotlin
java/unused-field
Unused field
CWE-398
Java/Kotlin
java/unused-label
Unused label
CWE-398
Java/Kotlin
java/unused-local-variable
Unused local variable
CWE-398
Java/Kotlin
java/switch-fall-through
Unterminated switch case
CWE-398
Java/Kotlin
java/redundant-cast
Unnecessary cast
CWE-398
Java/Kotlin
java/unused-import
Unnecessary import
CWE-398
JavaScript/TypeScript
js/todo-comment
TODO comment
CWE-398
JavaScript/TypeScript
js/eval-like-call
Call to eval-like DOM function
CWE-398
JavaScript/TypeScript
js/variable-initialization-conflict
Conflicting variable initialization
CWE-398
JavaScript/TypeScript
js/function-declaration-conflict
Conflicting function declarations
CWE-398
JavaScript/TypeScript
js/useless-assignment-to-global
Useless assignment to global variable
CWE-398
JavaScript/TypeScript
js/useless-assignment-to-local
Useless assignment to local variable
CWE-398
JavaScript/TypeScript
js/overwritten-property
Overwritten property
CWE-398
JavaScript/TypeScript
js/comparison-of-identical-expressions
Comparison of identical values
CWE-398
JavaScript/TypeScript
js/comparison-with-nan
Comparison with NaN
CWE-398
JavaScript/TypeScript
js/duplicate-condition
Duplicate 'if' condition
CWE-398
JavaScript/TypeScript
js/duplicate-property
Duplicate property
CWE-398
JavaScript/TypeScript
js/duplicate-switch-case
Duplicate switch case
CWE-398
JavaScript/TypeScript
js/useless-expression
Expression has no effect
CWE-398
JavaScript/TypeScript
js/comparison-between-incompatible-types
Comparison between inconvertible types
CWE-398
JavaScript/TypeScript
js/redundant-operation
Identical operands
CWE-398
JavaScript/TypeScript
js/redundant-assignment
Self assignment
CWE-398
JavaScript/TypeScript
js/call-to-non-callable
Invocation of non-function
CWE-398
JavaScript/TypeScript
js/property-access-on-non-object
Property access on null or undefined
CWE-398
JavaScript/TypeScript
js/unneeded-defensive-code
Unneeded defensive code
CWE-398
JavaScript/TypeScript
js/useless-type-test
Useless type test
CWE-398
JavaScript/TypeScript
js/eval-call
Use of eval
CWE-398
JavaScript/TypeScript
js/node/assignment-to-exports-variable
Assignment to exports variable
CWE-398
JavaScript/TypeScript
js/regex/unmatchable-caret
Unmatchable caret in regular expression
CWE-398
JavaScript/TypeScript
js/regex/unmatchable-dollar
Unmatchable dollar in regular expression
CWE-398
JavaScript/TypeScript
js/useless-assignment-in-return
Return statement assigns local variable
CWE-398
JavaScript/TypeScript
js/unreachable-statement
Unreachable statement
CWE-398
JavaScript/TypeScript
js/trivial-conditional
Useless conditional
CWE-398
Python
py/unreachable-except
Unreachable except block
CWE-398
Python
py/comparison-of-constants
Comparison of constants
CWE-398
Python
py/comparison-of-identical-expressions
Comparison of identical values
CWE-398
Python
py/comparison-missing-self
Maybe missing 'self' in comparison
CWE-398
Python
py/redundant-comparison
Redundant comparison
CWE-398
Python
py/duplicate-key-dict-literal
Duplicate key in dict literal
CWE-398
Python
py/import-deprecated-module
Import of deprecated module
CWE-398
Python
py/constant-conditional-expression
Constant in conditional expression or statement
CWE-398
Python
py/redundant-assignment
Redundant assignment
CWE-398
Python
py/ineffectual-statement
Statement has no effect
CWE-398
Python
py/unreachable-statement
Unreachable code
CWE-398
Python
py/multiple-definition
Variable defined multiple times
CWE-398
Python
py/unused-local-variable
Unused local variable
CWE-398
Python
py/unused-global-variable
Unused global variable
CWE-398
Ruby
rb/useless-assignment-to-local
Useless assignment to local variable
CWE-398
Ruby
rb/unused-parameter
Unused parameter
CWE-398
Rust
rust/access-invalid-pointer
Access of invalid pointer
CWE-400
C/C++
cpp/catch-missing-free
Leaky catch
CWE-400
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-400
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-400
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-400
C/C++
cpp/file-never-closed
Open file is not closed
CWE-400
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-400
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-400
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-400
C/C++
cpp/alloca-in-loop
Call to alloca in a loop
CWE-400
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-400
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-400
C#
cs/redos
Denial of Service from comparison of user input against expensive regex
CWE-400
C#
cs/regex-injection
Regular expression injection
CWE-400
Go
go/uncontrolled-allocation-size
Slice memory allocation with excessive size value
CWE-400
Java/Kotlin
java/input-resource-leak
Potential input resource leak
CWE-400
Java/Kotlin
java/database-resource-leak
Potential database resource leak
CWE-400
Java/Kotlin
java/output-resource-leak
Potential output resource leak
CWE-400
Java/Kotlin
java/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-400
Java/Kotlin
java/redos
Inefficient regular expression
CWE-400
Java/Kotlin
java/regex-injection
Regular expression injection
CWE-400
Java/Kotlin
java/log4j-injection
Potential Log4J LDAP JNDI injection (CVE-2021-44228)
CWE-400
Java/Kotlin
java/local-thread-resource-abuse
Uncontrolled thread resource consumption from local input source
CWE-400
Java/Kotlin
java/thread-resource-abuse
Uncontrolled thread resource consumption
CWE-400
JavaScript/TypeScript
js/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-400
JavaScript/TypeScript
js/redos
Inefficient regular expression
CWE-400
JavaScript/TypeScript
js/resource-exhaustion-from-deep-object-traversal
Resources exhaustion from deep object traversal
CWE-400
JavaScript/TypeScript
js/remote-property-injection
Remote property injection
CWE-400
JavaScript/TypeScript
js/regex-injection
Regular expression injection
CWE-400
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-400
JavaScript/TypeScript
js/resource-exhaustion
Resource exhaustion
CWE-400
JavaScript/TypeScript
js/xml-bomb
XML internal entity expansion
CWE-400
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-400
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-400
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-400
JavaScript/TypeScript
js/remote-property-injection-more-sources
Remote property injection with additional heuristic sources
CWE-400
JavaScript/TypeScript
js/regex-injection-more-sources
Regular expression injection with additional heuristic sources
CWE-400
JavaScript/TypeScript
js/resource-exhaustion-more-sources
Resource exhaustion with additional heuristic sources
CWE-400
JavaScript/TypeScript
js/xml-bomb-more-sources
XML internal entity expansion with additional heuristic sources
CWE-400
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-400
Python
py/file-not-closed
File is not always closed
CWE-400
Python
py/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-400
Python
py/redos
Inefficient regular expression
CWE-400
Python
py/regex-injection
Regular expression injection
CWE-400
Python
py/xml-bomb
XML internal entity expansion
CWE-400
Python
py/unicode-dos
Denial of Service using Unicode Characters
CWE-400
Ruby
rb/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-400
Ruby
rb/redos
Inefficient regular expression
CWE-400
Ruby
rb/regexp-injection
Regular expression injection
CWE-400
Rust
rust/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-400
Swift
swift/redos
Inefficient regular expression
CWE-400
Swift
swift/regex-injection
Regular expression injection
CWE-401
C/C++
cpp/catch-missing-free
Leaky catch
CWE-401
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-401
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-401
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-401
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-404
C/C++
cpp/catch-missing-free
Leaky catch
CWE-404
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-404
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-404
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-404
C/C++
cpp/file-never-closed
Open file is not closed
CWE-404
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-404
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-404
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-404
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-404
C/C++
cpp/resource-not-released-in-destructor
Resource not released in destructor
CWE-404
C#
cs/dispose-not-called-on-throw
Dispose may not be called if an exception is thrown during execution
CWE-404
C#
cs/member-not-disposed
Missing Dispose call
CWE-404
C#
cs/missing-dispose-method
Missing Dispose method
CWE-404
C#
cs/local-not-disposed
Missing Dispose call on local IDisposable
CWE-404
Java/Kotlin
java/missing-super-finalize
Finalizer inconsistency
CWE-404
Java/Kotlin
java/input-resource-leak
Potential input resource leak
CWE-404
Java/Kotlin
java/database-resource-leak
Potential database resource leak
CWE-404
Java/Kotlin
java/output-resource-leak
Potential output resource leak
CWE-404
Java/Kotlin
java/empty-finalizer
Empty body of finalizer
CWE-404
Java/Kotlin
java/disabled-certificate-revocation-checking
Disabled certificate revocation checking
CWE-404
Python
py/file-not-closed
File is not always closed
CWE-405
C/C++
cpp/data-decompression-bomb
User-controlled file decompression
CWE-405
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-405
C#
cs/insecure-xml-read
XML is read insecurely
CWE-405
Go
go/uncontrolled-file-decompression
Uncontrolled file decompression
CWE-405
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-405
Java/Kotlin
java/uncontrolled-file-decompression
Uncontrolled file decompression
CWE-405
JavaScript/TypeScript
js/xml-bomb
XML internal entity expansion
CWE-405
JavaScript/TypeScript
js/xml-bomb-more-sources
XML internal entity expansion with additional heuristic sources
CWE-405
Python
py/xml-bomb
XML internal entity expansion
CWE-405
Python
py/decompression-bomb
Decompression Bomb
CWE-405
Python
py/simple-xml-rpc-server-dos
SimpleXMLRPCServer denial of service
CWE-405
Ruby
rb/user-controlled-data-decompression
User-controlled file decompression
CWE-405
Ruby
rb/user-controlled-file-decompression
User-controlled file decompression
CWE-405
Ruby
rb/xxe
XML external entity expansion
CWE-405
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-409
C/C++
cpp/data-decompression-bomb
User-controlled file decompression
CWE-409
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-409
C#
cs/insecure-xml-read
XML is read insecurely
CWE-409
Go
go/uncontrolled-file-decompression
Uncontrolled file decompression
CWE-409
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-409
Java/Kotlin
java/uncontrolled-file-decompression
Uncontrolled file decompression
CWE-409
JavaScript/TypeScript
js/xml-bomb
XML internal entity expansion
CWE-409
JavaScript/TypeScript
js/xml-bomb-more-sources
XML internal entity expansion with additional heuristic sources
CWE-409
Python
py/xml-bomb
XML internal entity expansion
CWE-409
Python
py/decompression-bomb
Decompression Bomb
CWE-409
Python
py/simple-xml-rpc-server-dos
SimpleXMLRPCServer denial of service
CWE-409
Ruby
rb/user-controlled-data-decompression
User-controlled file decompression
CWE-409
Ruby
rb/user-controlled-file-decompression
User-controlled file decompression
CWE-409
Ruby
rb/xxe
XML external entity expansion
CWE-409
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-413
Java/Kotlin
java/unsynchronized-getter
Inconsistent synchronization of getter and setter
CWE-415
C/C++
cpp/double-free
Potential double free
CWE-415
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-415
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-416
C/C++
cpp/use-after-free
Potential use after free
CWE-416
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-416
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-416
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-416
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-420
Java/Kotlin
java/socket-auth-race-condition
Race condition in socket authentication
CWE-421
Java/Kotlin
java/socket-auth-race-condition
Race condition in socket authentication
CWE-428
C/C++
cpp/unsafe-create-process-call
NULL application name with an unquoted path in call to CreateProcess
CWE-434
C#
cs/web/file-upload
Use of file upload
CWE-434
JavaScript/TypeScript
js/http-to-file-access
Network data written to file
CWE-434
Ruby
rb/http-to-file-access
Network data written to file
CWE-435
C/C++
cpp/memset-may-be-deleted
Call to memset may be deleted
CWE-435
JavaScript/TypeScript
js/insecure-http-parser
Insecure http parser
CWE-436
JavaScript/TypeScript
js/insecure-http-parser
Insecure http parser
CWE-441
GitHub Actions
actions/request-forgery
Uncontrolled data used in network request
CWE-441
C#
cs/request-forgery
Server-side request forgery
CWE-441
Go
go/request-forgery
Uncontrolled data used in network request
CWE-441
Go
go/ssrf
Uncontrolled data used in network request
CWE-441
Java/Kotlin
java/android/unsafe-content-uri-resolution
Uncontrolled data used in content resolution
CWE-441
Java/Kotlin
java/ssrf
Server-side request forgery
CWE-441
JavaScript/TypeScript
js/client-side-request-forgery
Client-side request forgery
CWE-441
JavaScript/TypeScript
js/request-forgery
Server-side request forgery
CWE-441
JavaScript/TypeScript
javascript/ssrf
Uncontrolled data used in network request
CWE-441
Python
py/full-ssrf
Full server-side request forgery
CWE-441
Python
py/partial-ssrf
Partial server-side request forgery
CWE-441
Ruby
rb/request-forgery
Server-side request forgery
CWE-441
Rust
rust/request-forgery
Server-side request forgery
CWE-444
JavaScript/TypeScript
js/insecure-http-parser
Insecure http parser
CWE-451
C#
cs/web/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-451
JavaScript/TypeScript
js/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-454
Java/Kotlin
java/exec-tainted-environment
Building a command with an injected environment variable
CWE-456
C/C++
cpp/initialization-not-run
Initialization code not run
CWE-457
C/C++
cpp/global-use-before-init
Global variable may be used before initialization
CWE-457
C/C++
cpp/not-initialised
Variable not initialized before use
CWE-457
C/C++
cpp/uninitialized-local
Potentially uninitialized local variable
CWE-457
C/C++
cpp/conditionally-uninitialized-variable
Conditionally uninitialized variable
CWE-457
C#
cs/unassigned-field
Field is never assigned a non-default value
CWE-457
Java/Kotlin
java/unassigned-field
Field is never assigned a non-null value
CWE-459
C#
cs/dispose-not-called-on-throw
Dispose may not be called if an exception is thrown during execution
CWE-459
C#
cs/member-not-disposed
Missing Dispose call
CWE-459
C#
cs/missing-dispose-method
Missing Dispose method
CWE-459
C#
cs/local-not-disposed
Missing Dispose call on local IDisposable
CWE-459
Java/Kotlin
java/missing-super-finalize
Finalizer inconsistency
CWE-459
Java/Kotlin
java/empty-finalizer
Empty body of finalizer
CWE-460
C#
cs/dispose-not-called-on-throw
Dispose may not be called if an exception is thrown during execution
CWE-460
C#
cs/local-not-disposed
Missing Dispose call on local IDisposable
CWE-467
C/C++
cpp/suspicious-sizeof
Suspicious 'sizeof' use
CWE-468
C/C++
cpp/suspicious-pointer-scaling
Suspicious pointer scaling
CWE-468
C/C++
cpp/incorrect-pointer-scaling-char
Suspicious pointer scaling to char
CWE-468
C/C++
cpp/suspicious-pointer-scaling-void
Suspicious pointer scaling to void
CWE-468
C/C++
cpp/suspicious-add-sizeof
Suspicious add with sizeof
CWE-470
Java/Kotlin
java/android/fragment-injection
Android fragment injection
CWE-470
Java/Kotlin
java/android/fragment-injection-preference-activity
Android fragment injection in PreferenceActivity
CWE-470
Java/Kotlin
java/android/unsafe-reflection
Load 3rd party classes or code ('unsafe reflection') without signature check
CWE-470
Java/Kotlin
java/unsafe-reflection
Use of externally-controlled input to select classes or code ('unsafe reflection')
CWE-471
C#
cs/web/html-hidden-input
Use of HTMLInputHidden
CWE-471
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-471
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-471
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-471
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-472
C#
cs/web/html-hidden-input
Use of HTMLInputHidden
CWE-476
C/C++
cpp/inconsistent-nullness-testing
Inconsistent null check of pointer
CWE-476
C/C++
cpp/missing-null-test
Returned pointer not checked
CWE-476
C/C++
cpp/inconsistent-null-check
Inconsistent nullness check
CWE-476
C/C++
cpp/redundant-null-check-simple
Redundant null check due to previous dereference
CWE-476
C/C++
cpp/deref-null-result
Null dereference from a function result
CWE-476
C/C++
cpp/redundant-null-check-param
Redundant null check or missing null check of parameter
CWE-476
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-476
C#
cs/dereferenced-value-is-always-null
Dereferenced variable is always null
CWE-476
C#
cs/dereferenced-value-may-be-null
Dereferenced variable may be null
CWE-476
Java/Kotlin
java/dereferenced-value-is-always-null
Dereferenced variable is always null
CWE-476
Java/Kotlin
java/dereferenced-expr-may-be-null
Dereferenced expression may be null
CWE-476
Java/Kotlin
java/dereferenced-value-may-be-null
Dereferenced variable may be null
CWE-476
JavaScript/TypeScript
js/call-to-non-callable
Invocation of non-function
CWE-476
JavaScript/TypeScript
js/property-access-on-non-object
Property access on null or undefined
CWE-476
Rust
rust/access-invalid-pointer
Access of invalid pointer
CWE-477
C#
cs/call-to-obsolete-method
Call to obsolete method
CWE-477
Java/Kotlin
java/deprecated-call
Deprecated method or constructor invocation
CWE-477
Python
py/import-deprecated-module
Import of deprecated module
CWE-478
C/C++
cpp/missing-case-in-switch
Missing enum case in switch
CWE-478
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-478
Java/Kotlin
java/missing-default-in-switch
Missing default case in switch
CWE-478
Java/Kotlin
java/missing-case-in-switch
Missing enum case in switch
CWE-480
C/C++
cpp/assign-where-compare-meant
Assignment where comparison was intended
CWE-480
C/C++
cpp/compare-where-assign-meant
Comparison where assignment was intended
CWE-480
C/C++
cpp/incorrect-not-operator-usage
Incorrect 'not' operator usage
CWE-480
C/C++
cpp/logical-operator-applied-to-flag
Short-circuiting operator applied to flag
CWE-480
C/C++
cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations
Operator Precedence Logic Error When Use Bitwise Or Logical Operations
CWE-480
C/C++
cpp/operator-precedence-logic-error-when-use-bool-type
Operator Precedence Logic Error When Use Bool Type
CWE-480
C#
cs/non-short-circuit
Potentially dangerous use of non-short-circuit logic
CWE-480
Go
go/mistyped-exponentiation
Bitwise exclusive-or used like exponentiation
CWE-480
Go
go/useless-expression
Expression has no effect
CWE-480
Go
go/redundant-operation
Identical operands
CWE-480
Go
go/redundant-assignment
Self assignment
CWE-480
Java/Kotlin
java/assignment-in-boolean-expression
Assignment in Boolean expression
CWE-480
Java/Kotlin
java/reference-equality-on-strings
Reference equality test on strings
CWE-480
JavaScript/TypeScript
js/useless-expression
Expression has no effect
CWE-480
JavaScript/TypeScript
js/redundant-operation
Identical operands
CWE-480
JavaScript/TypeScript
js/redundant-assignment
Self assignment
CWE-480
JavaScript/TypeScript
js/deletion-of-non-property
Deleting non-property
CWE-481
C/C++
cpp/assign-where-compare-meant
Assignment where comparison was intended
CWE-481
Java/Kotlin
java/assignment-in-boolean-expression
Assignment in Boolean expression
CWE-482
C/C++
cpp/compare-where-assign-meant
Comparison where assignment was intended
CWE-483
JavaScript/TypeScript
js/misleading-indentation-of-dangling-else
Misleading indentation of dangling 'else'
CWE-483
JavaScript/TypeScript
js/misleading-indentation-after-control-statement
Misleading indentation after control statement
CWE-484
Java/Kotlin
java/switch-fall-through
Unterminated switch case
CWE-485
C#
cs/class-name-comparison
Erroneous class compare
CWE-485
C#
cs/cast-from-abstract-to-concrete-collection
Cast from abstract to concrete collection
CWE-485
C#
cs/expose-implementation
Exposing internal representation
CWE-485
C#
cs/web/debug-code
ASP.NET: leftover debug code
CWE-485
Java/Kotlin
java/missing-call-to-super-clone
Missing super clone
CWE-485
Java/Kotlin
java/cleartext-storage-in-class
Cleartext storage of sensitive information using storable class
CWE-485
Java/Kotlin
java/android/debuggable-attribute-enabled
Android debuggable attribute enabled
CWE-485
Java/Kotlin
java/android/webview-debugging-enabled
Android Webview debugging enabled
CWE-485
Java/Kotlin
java/trust-boundary-violation
Trust boundary violation
CWE-485
Java/Kotlin
java/android/unsafe-android-webview-fetch
Unsafe resource fetching in Android WebView
CWE-485
Java/Kotlin
java/abstract-to-concrete-cast
Cast from abstract to concrete collection
CWE-485
Java/Kotlin
java/internal-representation-exposure
Exposing internal representation
CWE-485
Java/Kotlin
java/main-method-in-enterprise-bean
Main Method in Enterprise Java Bean
CWE-485
Java/Kotlin
java/main-method-in-web-components
Main Method in Java EE Web Components
CWE-485
Java/Kotlin
java/struts-development-mode
Apache Struts development mode enabled
CWE-485
JavaScript/TypeScript
js/alert-call
Invocation of alert
CWE-485
JavaScript/TypeScript
js/debugger-statement
Use of debugger statement
CWE-485
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-485
Python
py/flask-debug
Flask app is run in debug mode
CWE-485
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-485
Swift
swift/unsafe-js-eval
JavaScript Injection
CWE-486
C#
cs/class-name-comparison
Erroneous class compare
CWE-489
C#
cs/web/debug-code
ASP.NET: leftover debug code
CWE-489
Java/Kotlin
java/android/debuggable-attribute-enabled
Android debuggable attribute enabled
CWE-489
Java/Kotlin
java/android/webview-debugging-enabled
Android Webview debugging enabled
CWE-489
Java/Kotlin
java/main-method-in-enterprise-bean
Main Method in Enterprise Java Bean
CWE-489
Java/Kotlin
java/main-method-in-web-components
Main Method in Java EE Web Components
CWE-489
Java/Kotlin
java/struts-development-mode
Apache Struts development mode enabled
CWE-489
JavaScript/TypeScript
js/alert-call
Invocation of alert
CWE-489
JavaScript/TypeScript
js/debugger-statement
Use of debugger statement
CWE-489
Python
py/flask-debug
Flask app is run in debug mode
CWE-494
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-494
JavaScript/TypeScript
js/enabling-electron-insecure-content
Enabling Electron allowRunningInsecureContent
CWE-494
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-494
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-497
C/C++
cpp/system-data-exposure
Exposure of system data to an unauthorized control sphere
CWE-497
C/C++
cpp/potential-system-data-exposure
Potential exposure of sensitive system data to an unauthorized control sphere
CWE-497
C#
cs/information-exposure-through-exception
Information exposure through an exception
CWE-497
Go
go/stack-trace-exposure
Information exposure through a stack trace
CWE-497
Java/Kotlin
java/stack-trace-exposure
Information exposure through a stack trace
CWE-497
JavaScript/TypeScript
js/stack-trace-exposure
Information exposure through a stack trace
CWE-497
Python
py/stack-trace-exposure
Information exposure through an exception
CWE-497
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-499
Java/Kotlin
java/cleartext-storage-in-class
Cleartext storage of sensitive information using storable class
CWE-501
Java/Kotlin
java/trust-boundary-violation
Trust boundary violation
CWE-502
C#
cs/deserialized-delegate
Deserialized delegate
CWE-502
C#
cs/unsafe-deserialization
Unsafe deserializer
CWE-502
C#
cs/unsafe-deserialization-untrusted-input
Deserialization of untrusted data
CWE-502
Java/Kotlin
java/unsafe-deserialization
Deserialization of user-controlled data
CWE-502
Java/Kotlin
java/log4j-injection
Potential Log4J LDAP JNDI injection (CVE-2021-44228)
CWE-502
Java/Kotlin
java/unsafe-deserialization-rmi
Unsafe deserialization in a remotely callable method
CWE-502
Java/Kotlin
java/unsafe-deserialization-spring-exporter-in-configuration-class
Unsafe deserialization with Spring's remote service exporters
CWE-502
Java/Kotlin
java/unsafe-deserialization-spring-exporter-in-xml-configuration
Unsafe deserialization with Spring's remote service exporters
CWE-502
JavaScript/TypeScript
js/unsafe-deserialization
Deserialization of user-controlled data
CWE-502
JavaScript/TypeScript
js/unsafe-deserialization-more-sources
Deserialization of user-controlled data with additional heuristic sources
CWE-502
Python
py/unsafe-deserialization
Deserialization of user-controlled data
CWE-502
Ruby
rb/unsafe-unsafeyamldeserialization
Deserialization of user-controlled yaml data
CWE-502
Ruby
rb/unsafe-deserialization
Deserialization of user-controlled data
CWE-506
JavaScript/TypeScript
js/hardcoded-data-interpreted-as-code
Hard-coded data interpreted as code
CWE-506
Ruby
rb/hardcoded-data-interpreted-as-code
Hard-coded data interpreted as code
CWE-521
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-521
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-522
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-522
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-522
C#
cs/password-in-configuration
Password in configuration file
CWE-522
Java/Kotlin
java/insecure-basic-auth
Insecure basic authentication
CWE-522
Java/Kotlin
java/insecure-ldap-auth
Insecure LDAP authentication
CWE-522
Java/Kotlin
java/credentials-in-properties
Cleartext Credentials in Properties File
CWE-522
Java/Kotlin
java/password-in-configuration
Password in configuration file
CWE-522
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-522
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-522
JavaScript/TypeScript
js/user-controlled-data-decompression
User-controlled file decompression
CWE-522
Python
py/insecure-ldap-auth
Python Insecure LDAP Authentication
CWE-523
Python
py/insecure-ldap-auth
Python Insecure LDAP Authentication
CWE-524
Java/Kotlin
java/android/sensitive-keyboard-cache
Android sensitive keyboard cache
CWE-532
C#
cs/web/debug-binary
Creating an ASP.NET debug binary may reveal sensitive information
CWE-532
Java/Kotlin
java/sensitive-log
Insertion of sensitive information into log files
CWE-532
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-532
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-532
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-532
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-532
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-532
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-538
C#
cs/web/debug-binary
Creating an ASP.NET debug binary may reveal sensitive information
CWE-538
C#
cs/web/directory-browse-enabled
ASP.NET config file enables directory browsing
CWE-538
C#
cs/web/persistent-cookie
Cookie security: persistent cookie
CWE-538
Java/Kotlin
java/sensitive-log
Insertion of sensitive information into log files
CWE-538
Java/Kotlin
java/server-directory-listing
Directories and files exposure
CWE-538
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-538
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-538
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-538
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-538
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-538
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-538
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-539
C#
cs/web/persistent-cookie
Cookie security: persistent cookie
CWE-543
Java/Kotlin
java/lazy-initialization
Incorrect lazy initialization of a static field
CWE-546
C/C++
cpp/fixme-comment
FIXME comment
CWE-546
C/C++
cpp/todo-comment
TODO comment
CWE-546
C#
cs/todo-comment
TODO comment
CWE-546
Java/Kotlin
java/todo-comment
TODO/FIXME comments
CWE-546
JavaScript/TypeScript
js/todo-comment
TODO comment
CWE-548
C#
cs/web/directory-browse-enabled
ASP.NET config file enables directory browsing
CWE-548
Java/Kotlin
java/server-directory-listing
Directories and files exposure
CWE-548
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-552
C#
cs/web/debug-binary
Creating an ASP.NET debug binary may reveal sensitive information
CWE-552
C#
cs/web/directory-browse-enabled
ASP.NET config file enables directory browsing
CWE-552
Java/Kotlin
java/sensitive-log
Insertion of sensitive information into log files
CWE-552
Java/Kotlin
java/unvalidated-url-forward
URL forward from a remote source
CWE-552
Java/Kotlin
java/server-directory-listing
Directories and files exposure
CWE-552
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-552
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-552
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-552
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-552
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-552
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-552
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-555
Java/Kotlin
java/credentials-in-properties
Cleartext Credentials in Properties File
CWE-555
Java/Kotlin
java/password-in-configuration
Password in configuration file
CWE-560
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-561
C/C++
cpp/unused-static-function
Unused static function
CWE-561
C/C++
cpp/dead-code-condition
Branching condition always evaluates to same value
CWE-561
C/C++
cpp/dead-code-function
Function is never called
CWE-561
C/C++
cpp/dead-code-goto
Dead code due to goto or break statement
CWE-561
C/C++
cpp/useless-expression
Expression has no effect
CWE-561
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-561
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-561
C#
cs/unused-reftype
Dead reference types
CWE-561
C#
cs/unused-field
Unused field
CWE-561
C#
cs/unused-method
Unused method
CWE-561
C#
cs/useless-cast-to-self
Cast to same type
CWE-561
C#
cs/useless-is-before-as
Useless 'is' before 'as'
CWE-561
C#
cs/coalesce-of-identical-expressions
Useless ?? expression
CWE-561
C#
cs/useless-type-test
Useless type test
CWE-561
C#
cs/useless-upcast
Useless upcast
CWE-561
C#
cs/empty-collection
Container contents are never initialized
CWE-561
C#
cs/unused-collection
Container contents are never accessed
CWE-561
C#
cs/linq/useless-select
Redundant Select
CWE-561
Go
go/comparison-of-identical-expressions
Comparison of identical values
CWE-561
Go
go/duplicate-branches
Duplicate 'if' branches
CWE-561
Go
go/duplicate-condition
Duplicate 'if' condition
CWE-561
Go
go/duplicate-switch-case
Duplicate switch case
CWE-561
Go
go/useless-expression
Expression has no effect
CWE-561
Go
go/impossible-interface-nil-check
Impossible interface nil check
CWE-561
Go
go/negative-length-check
Redundant check for negative value
CWE-561
Go
go/redundant-operation
Identical operands
CWE-561
Go
go/redundant-assignment
Self assignment
CWE-561
Go
go/unreachable-statement
Unreachable statement
CWE-561
Go
go/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-561
Java/Kotlin
java/dead-class
Dead class
CWE-561
Java/Kotlin
java/dead-enum-constant
Dead enum constant
CWE-561
Java/Kotlin
java/dead-field
Dead field
CWE-561
Java/Kotlin
java/dead-function
Dead method
CWE-561
Java/Kotlin
java/lines-of-dead-code
Lines of dead code in files
CWE-561
Java/Kotlin
java/unused-parameter
Useless parameter
CWE-561
Java/Kotlin
java/useless-null-check
Useless null check
CWE-561
Java/Kotlin
java/useless-type-test
Useless type test
CWE-561
Java/Kotlin
java/useless-upcast
Useless upcast
CWE-561
Java/Kotlin
java/empty-container
Container contents are never initialized
CWE-561
Java/Kotlin
java/unused-container
Container contents are never accessed
CWE-561
Java/Kotlin
java/equals-on-unrelated-types
Equals on incomparable types
CWE-561
Java/Kotlin
java/constant-comparison
Useless comparison test
CWE-561
Java/Kotlin
java/unreachable-catch-clause
Unreachable catch clause
CWE-561
Java/Kotlin
java/unused-reference-type
Unused classes and interfaces
CWE-561
Java/Kotlin
java/useless-assignment-to-local
Useless assignment to local variable
CWE-561
Java/Kotlin
java/local-variable-is-never-read
Unread local variable
CWE-561
Java/Kotlin
java/unused-field
Unused field
CWE-561
Java/Kotlin
java/unused-label
Unused label
CWE-561
Java/Kotlin
java/redundant-cast
Unnecessary cast
CWE-561
Java/Kotlin
java/unused-import
Unnecessary import
CWE-561
JavaScript/TypeScript
js/comparison-of-identical-expressions
Comparison of identical values
CWE-561
JavaScript/TypeScript
js/comparison-with-nan
Comparison with NaN
CWE-561
JavaScript/TypeScript
js/duplicate-condition
Duplicate 'if' condition
CWE-561
JavaScript/TypeScript
js/duplicate-switch-case
Duplicate switch case
CWE-561
JavaScript/TypeScript
js/useless-expression
Expression has no effect
CWE-561
JavaScript/TypeScript
js/comparison-between-incompatible-types
Comparison between inconvertible types
CWE-561
JavaScript/TypeScript
js/redundant-operation
Identical operands
CWE-561
JavaScript/TypeScript
js/redundant-assignment
Self assignment
CWE-561
JavaScript/TypeScript
js/unneeded-defensive-code
Unneeded defensive code
CWE-561
JavaScript/TypeScript
js/useless-type-test
Useless type test
CWE-561
JavaScript/TypeScript
js/regex/unmatchable-caret
Unmatchable caret in regular expression
CWE-561
JavaScript/TypeScript
js/regex/unmatchable-dollar
Unmatchable dollar in regular expression
CWE-561
JavaScript/TypeScript
js/unreachable-statement
Unreachable statement
CWE-561
JavaScript/TypeScript
js/trivial-conditional
Useless conditional
CWE-561
Python
py/unreachable-except
Unreachable except block
CWE-561
Python
py/comparison-of-constants
Comparison of constants
CWE-561
Python
py/comparison-of-identical-expressions
Comparison of identical values
CWE-561
Python
py/comparison-missing-self
Maybe missing 'self' in comparison
CWE-561
Python
py/redundant-comparison
Redundant comparison
CWE-561
Python
py/duplicate-key-dict-literal
Duplicate key in dict literal
CWE-561
Python
py/constant-conditional-expression
Constant in conditional expression or statement
CWE-561
Python
py/ineffectual-statement
Statement has no effect
CWE-561
Python
py/unreachable-statement
Unreachable code
CWE-563
C/C++
cpp/unused-local-variable
Unused local variable
CWE-563
C/C++
cpp/unused-static-variable
Unused static variable
CWE-563
C/C++
cpp/unused-variable
Variable is assigned a value that is never read
CWE-563
C#
cs/useless-assignment-to-local
Useless assignment to local variable
CWE-563
Go
go/useless-assignment-to-field
Useless assignment to field
CWE-563
Go
go/useless-assignment-to-local
Useless assignment to local variable
CWE-563
Java/Kotlin
java/overwritten-assignment-to-local
Assigned value is overwritten
CWE-563
Java/Kotlin
java/unused-initialized-local
Local variable is initialized but not used
CWE-563
Java/Kotlin
java/unused-local-variable
Unused local variable
CWE-563
JavaScript/TypeScript
js/variable-initialization-conflict
Conflicting variable initialization
CWE-563
JavaScript/TypeScript
js/function-declaration-conflict
Conflicting function declarations
CWE-563
JavaScript/TypeScript
js/useless-assignment-to-global
Useless assignment to global variable
CWE-563
JavaScript/TypeScript
js/useless-assignment-to-local
Useless assignment to local variable
CWE-563
JavaScript/TypeScript
js/overwritten-property
Overwritten property
CWE-563
JavaScript/TypeScript
js/duplicate-property
Duplicate property
CWE-563
JavaScript/TypeScript
js/node/assignment-to-exports-variable
Assignment to exports variable
CWE-563
JavaScript/TypeScript
js/useless-assignment-in-return
Return statement assigns local variable
CWE-563
Python
py/redundant-assignment
Redundant assignment
CWE-563
Python
py/multiple-definition
Variable defined multiple times
CWE-563
Python
py/unused-local-variable
Unused local variable
CWE-563
Python
py/unused-global-variable
Unused global variable
CWE-563
Ruby
rb/useless-assignment-to-local
Useless assignment to local variable
CWE-563
Ruby
rb/unused-parameter
Unused parameter
CWE-564
Java/Kotlin
java/concatenated-sql-query
Query built by concatenation with a possibly-untrusted string
CWE-564
Java/Kotlin
java/sql-injection
Query built from user-controlled sources
CWE-567
C#
cs/unsynchronized-static-access
Unsynchronized access to static collection member in non-static context
CWE-568
Java/Kotlin
java/missing-super-finalize
Finalizer inconsistency
CWE-568
Java/Kotlin
java/empty-finalizer
Empty body of finalizer
CWE-570
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-570
Go
go/comparison-of-identical-expressions
Comparison of identical values
CWE-570
Go
go/impossible-interface-nil-check
Impossible interface nil check
CWE-570
Java/Kotlin
java/constant-comparison
Useless comparison test
CWE-570
JavaScript/TypeScript
js/comparison-of-identical-expressions
Comparison of identical values
CWE-570
JavaScript/TypeScript
js/comparison-with-nan
Comparison with NaN
CWE-570
JavaScript/TypeScript
js/comparison-between-incompatible-types
Comparison between inconvertible types
CWE-570
JavaScript/TypeScript
js/unneeded-defensive-code
Unneeded defensive code
CWE-570
JavaScript/TypeScript
js/useless-type-test
Useless type test
CWE-570
JavaScript/TypeScript
js/trivial-conditional
Useless conditional
CWE-570
Python
py/comparison-of-constants
Comparison of constants
CWE-570
Python
py/comparison-of-identical-expressions
Comparison of identical values
CWE-570
Python
py/comparison-missing-self
Maybe missing 'self' in comparison
CWE-570
Python
py/redundant-comparison
Redundant comparison
CWE-570
Python
py/constant-conditional-expression
Constant in conditional expression or statement
CWE-571
Go
go/comparison-of-identical-expressions
Comparison of identical values
CWE-571
Go
go/negative-length-check
Redundant check for negative value
CWE-571
Java/Kotlin
java/equals-on-unrelated-types
Equals on incomparable types
CWE-571
Java/Kotlin
java/constant-comparison
Useless comparison test
CWE-571
JavaScript/TypeScript
js/comparison-of-identical-expressions
Comparison of identical values
CWE-571
JavaScript/TypeScript
js/comparison-with-nan
Comparison with NaN
CWE-571
JavaScript/TypeScript
js/comparison-between-incompatible-types
Comparison between inconvertible types
CWE-571
JavaScript/TypeScript
js/unneeded-defensive-code
Unneeded defensive code
CWE-571
JavaScript/TypeScript
js/useless-type-test
Useless type test
CWE-571
JavaScript/TypeScript
js/trivial-conditional
Useless conditional
CWE-571
Python
py/comparison-of-constants
Comparison of constants
CWE-571
Python
py/comparison-of-identical-expressions
Comparison of identical values
CWE-571
Python
py/comparison-missing-self
Maybe missing 'self' in comparison
CWE-571
Python
py/redundant-comparison
Redundant comparison
CWE-571
Python
py/constant-conditional-expression
Constant in conditional expression or statement
CWE-572
Java/Kotlin
java/call-to-thread-run
Direct call to a run() method
CWE-573
C/C++
cpp/double-free
Potential double free
CWE-573
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-573
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-573
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-573
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-573
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-573
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-573
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-573
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-573
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-573
C/C++
cpp/twice-locked
Mutex locked twice
CWE-573
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-573
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-573
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-573
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-573
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-573
C/C++
cpp/double-release
Errors When Double Release
CWE-573
C#
cs/inconsistent-equals-and-gethashcode
Inconsistent Equals(object) and GetHashCode()
CWE-573
C#
cs/invalid-dynamic-call
Bad dynamic call
CWE-573
Java/Kotlin
java/ejb/container-interference
EJB interferes with container operation
CWE-573
Java/Kotlin
java/ejb/file-io
EJB uses file input/output
CWE-573
Java/Kotlin
java/ejb/graphics
EJB uses graphics
CWE-573
Java/Kotlin
java/ejb/native-code
EJB uses native code
CWE-573
Java/Kotlin
java/ejb/reflection
EJB uses reflection
CWE-573
Java/Kotlin
java/ejb/security-configuration-access
EJB accesses security configuration
CWE-573
Java/Kotlin
java/ejb/substitution-in-serialization
EJB uses substitution in serialization
CWE-573
Java/Kotlin
java/ejb/socket-or-stream-handler-factory
EJB sets socket factory or URL stream handler factory
CWE-573
Java/Kotlin
java/ejb/server-socket
EJB uses server socket
CWE-573
Java/Kotlin
java/ejb/non-final-static-field
EJB uses non-final static field
CWE-573
Java/Kotlin
java/ejb/synchronization
EJB uses synchronization
CWE-573
Java/Kotlin
java/ejb/this
EJB uses 'this' as argument or result
CWE-573
Java/Kotlin
java/ejb/threads
EJB uses threads
CWE-573
Java/Kotlin
java/missing-call-to-super-clone
Missing super clone
CWE-573
Java/Kotlin
java/inconsistent-equals-and-hashcode
Inconsistent equals and hashCode
CWE-573
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-573
Java/Kotlin
java/missing-super-finalize
Finalizer inconsistency
CWE-573
Java/Kotlin
java/missing-format-argument
Missing format argument
CWE-573
Java/Kotlin
java/unused-format-argument
Unused format argument
CWE-573
Java/Kotlin
java/static-initialization-vector
Using a static initialization vector for encryption
CWE-573
Java/Kotlin
java/empty-finalizer
Empty body of finalizer
CWE-573
JavaScript/TypeScript
js/superfluous-trailing-arguments
Superfluous trailing arguments
CWE-573
Python
py/equals-hash-mismatch
Inconsistent equality and hashing
CWE-573
Python
py/call/wrong-named-class-argument
Wrong name for an argument in a class instantiation
CWE-573
Python
py/call/wrong-number-class-arguments
Wrong number of arguments in a class instantiation
CWE-573
Python
py/super-not-enclosing-class
First argument to super() is not enclosing class
CWE-573
Python
py/call/wrong-named-argument
Wrong name for an argument in a call
CWE-573
Python
py/percent-format/wrong-arguments
Wrong number of arguments for format
CWE-573
Python
py/call/wrong-arguments
Wrong number of arguments in a call
CWE-573
Swift
swift/static-initialization-vector
Static initialization vector for encryption
CWE-574
Java/Kotlin
java/ejb/synchronization
EJB uses synchronization
CWE-575
Java/Kotlin
java/ejb/graphics
EJB uses graphics
CWE-576
Java/Kotlin
java/ejb/file-io
EJB uses file input/output
CWE-577
Java/Kotlin
java/ejb/socket-or-stream-handler-factory
EJB sets socket factory or URL stream handler factory
CWE-577
Java/Kotlin
java/ejb/server-socket
EJB uses server socket
CWE-578
Java/Kotlin
java/ejb/container-interference
EJB interferes with container operation
CWE-580
Java/Kotlin
java/missing-call-to-super-clone
Missing super clone
CWE-581
C#
cs/inconsistent-equals-and-gethashcode
Inconsistent Equals(object) and GetHashCode()
CWE-581
Java/Kotlin
java/inconsistent-equals-and-hashcode
Inconsistent equals and hashCode
CWE-581
Python
py/equals-hash-mismatch
Inconsistent equality and hashing
CWE-582
C#
cs/static-array
Array constant vulnerable to change
CWE-582
Java/Kotlin
java/static-array
Array constant vulnerable to change
CWE-584
Java/Kotlin
java/abnormal-finally-completion
Finally block may not complete normally
CWE-584
JavaScript/TypeScript
js/exit-from-finally
Jump from finally
CWE-584
Python
py/exit-from-finally
'break' or 'return' statement in finally
CWE-585
C#
cs/empty-lock-statement
Empty lock statement
CWE-585
Java/Kotlin
java/empty-synchronized-block
Empty synchronized block
CWE-586
Java/Kotlin
java/do-not-call-finalize
Do not call finalize()
CWE-592
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-592
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-592
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-592
Java/Kotlin
java/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-592
Java/Kotlin
java/tainted-permissions-check
User-controlled data used in permissions check
CWE-592
JavaScript/TypeScript
js/user-controlled-bypass
User-controlled bypass of security check
CWE-592
JavaScript/TypeScript
js/different-kinds-comparison-bypass
Comparison of user-controlled data of different kinds
CWE-592
JavaScript/TypeScript
js/user-controlled-bypass-more-sources
User-controlled bypass of security check with additional heuristic sources
CWE-592
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-595
C#
cs/reference-equality-with-object
Reference equality test on System.Object
CWE-595
C#
cs/reference-equality-on-valuetypes
Call to ReferenceEquals(...) on value type expressions
CWE-595
Java/Kotlin
java/reference-equality-with-object
Reference equality test on java.lang.Object
CWE-595
Java/Kotlin
java/reference-equality-of-boxed-types
Reference equality test of boxed types
CWE-595
Java/Kotlin
java/reference-equality-on-strings
Reference equality test on strings
CWE-597
Java/Kotlin
java/reference-equality-on-strings
Reference equality test on strings
CWE-598
Java/Kotlin
java/sensitive-query-with-get
Sensitive GET Query
CWE-598
JavaScript/TypeScript
js/sensitive-get-query
Sensitive data read from GET request
CWE-598
Ruby
rb/sensitive-get-query
Sensitive data read from GET request
CWE-600
Java/Kotlin
java/uncaught-servlet-exception
Uncaught Servlet Exception
CWE-601
C#
cs/web/unvalidated-url-redirection
URL redirection from remote source
CWE-601
Go
go/bad-redirect-check
Bad redirect check
CWE-601
Go
go/unvalidated-url-redirection
Open URL redirect
CWE-601
Java/Kotlin
java/unvalidated-url-redirection
URL redirection from remote source
CWE-601
Java/Kotlin
java/spring-unvalidated-url-redirection
Spring url redirection from remote source
CWE-601
JavaScript/TypeScript
js/client-side-unvalidated-url-redirection
Client-side URL redirect
CWE-601
JavaScript/TypeScript
js/server-side-unvalidated-url-redirection
Server-side URL redirect
CWE-601
Python
py/url-redirection
URL redirection from remote source
CWE-601
Ruby
rb/url-redirection
URL redirection from remote source
CWE-609
C#
cs/unsafe-double-checked-lock
Double-checked lock is not thread-safe
CWE-609
Java/Kotlin
java/unsafe-double-checked-locking
Double-checked locking is not thread-safe
CWE-609
Java/Kotlin
java/unsafe-double-checked-locking-init-order
Race condition in double-checked locking object initialization
CWE-609
Java/Kotlin
java/lazy-initialization
Incorrect lazy initialization of a static field
CWE-610
GitHub Actions
actions/request-forgery
Uncontrolled data used in network request
CWE-610
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-610
C/C++
cpp/external-entity-expansion
XML external entity expansion
CWE-610
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-610
C#
cs/web/unvalidated-url-redirection
URL redirection from remote source
CWE-610
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-610
C#
cs/insecure-xml-read
XML is read insecurely
CWE-610
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-610
C#
cs/request-forgery
Server-side request forgery
CWE-610
Go
go/path-injection
Uncontrolled data used in path expression
CWE-610
Go
go/bad-redirect-check
Bad redirect check
CWE-610
Go
go/unvalidated-url-redirection
Open URL redirect
CWE-610
Go
go/request-forgery
Uncontrolled data used in network request
CWE-610
Go
go/ssrf
Uncontrolled data used in network request
CWE-610
Java/Kotlin
java/path-injection
Uncontrolled data used in path expression
CWE-610
Java/Kotlin
java/android/unsafe-content-uri-resolution
Uncontrolled data used in content resolution
CWE-610
Java/Kotlin
java/android/fragment-injection
Android fragment injection
CWE-610
Java/Kotlin
java/android/fragment-injection-preference-activity
Android fragment injection in PreferenceActivity
CWE-610
Java/Kotlin
java/unvalidated-url-redirection
URL redirection from remote source
CWE-610
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-610
Java/Kotlin
java/ssrf
Server-side request forgery
CWE-610
Java/Kotlin
java/file-path-injection
File Path Injection
CWE-610
Java/Kotlin
java/android/unsafe-reflection
Load 3rd party classes or code ('unsafe reflection') without signature check
CWE-610
Java/Kotlin
java/unsafe-reflection
Use of externally-controlled input to select classes or code ('unsafe reflection')
CWE-610
Java/Kotlin
java/spring-unvalidated-url-redirection
Spring url redirection from remote source
CWE-610
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-610
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-610
JavaScript/TypeScript
js/client-side-unvalidated-url-redirection
Client-side URL redirect
CWE-610
JavaScript/TypeScript
js/server-side-unvalidated-url-redirection
Server-side URL redirect
CWE-610
JavaScript/TypeScript
js/xxe
XML external entity expansion
CWE-610
JavaScript/TypeScript
js/client-side-request-forgery
Client-side request forgery
CWE-610
JavaScript/TypeScript
js/request-forgery
Server-side request forgery
CWE-610
JavaScript/TypeScript
javascript/ssrf
Uncontrolled data used in network request
CWE-610
JavaScript/TypeScript
js/xxe-more-sources
XML external entity expansion with additional heuristic sources
CWE-610
Python
py/path-injection
Uncontrolled data used in path expression
CWE-610
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-610
Python
py/url-redirection
URL redirection from remote source
CWE-610
Python
py/xxe
XML external entity expansion
CWE-610
Python
py/full-ssrf
Full server-side request forgery
CWE-610
Python
py/partial-ssrf
Partial server-side request forgery
CWE-610
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-610
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-610
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-610
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-610
Ruby
rb/url-redirection
URL redirection from remote source
CWE-610
Ruby
rb/xxe
XML external entity expansion
CWE-610
Ruby
rb/request-forgery
Server-side request forgery
CWE-610
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-610
Rust
rust/request-forgery
Server-side request forgery
CWE-610
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-610
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-611
C/C++
cpp/external-entity-expansion
XML external entity expansion
CWE-611
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-611
C#
cs/insecure-xml-read
XML is read insecurely
CWE-611
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-611
JavaScript/TypeScript
js/xxe
XML external entity expansion
CWE-611
JavaScript/TypeScript
js/xxe-more-sources
XML external entity expansion with additional heuristic sources
CWE-611
Python
py/xxe
XML external entity expansion
CWE-611
Ruby
rb/xxe
XML external entity expansion
CWE-611
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-614
C#
cs/web/cookie-secure-not-set
Cookie 'Secure' attribute is not set to true
CWE-614
C#
cs/web/requiressl-not-set
'requireSSL' attribute is not set to true
CWE-614
Go
go/cookie-secure-not-set
Cookie 'Secure' attribute is not set to true
CWE-614
Java/Kotlin
java/insecure-cookie
Failure to use secure cookies
CWE-614
JavaScript/TypeScript
js/clear-text-cookie
Clear text transmission of sensitive cookie
CWE-614
Python
py/insecure-cookie
Failure to use secure cookies
CWE-614
Rust
rust/insecure-cookie
'Secure' attribute is not set to true
CWE-625
Java/Kotlin
java/permissive-dot-regex
URL matched by permissive . in a regular expression
CWE-625
JavaScript/TypeScript
js/angular/insecure-url-whitelist
Insecure URL whitelist
CWE-628
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-628
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-628
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-628
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-628
C#
cs/invalid-dynamic-call
Bad dynamic call
CWE-628
Java/Kotlin
java/missing-format-argument
Missing format argument
CWE-628
Java/Kotlin
java/unused-format-argument
Unused format argument
CWE-628
JavaScript/TypeScript
js/superfluous-trailing-arguments
Superfluous trailing arguments
CWE-628
Python
py/call/wrong-named-class-argument
Wrong name for an argument in a class instantiation
CWE-628
Python
py/call/wrong-number-class-arguments
Wrong number of arguments in a class instantiation
CWE-628
Python
py/super-not-enclosing-class
First argument to super() is not enclosing class
CWE-628
Python
py/call/wrong-named-argument
Wrong name for an argument in a call
CWE-628
Python
py/percent-format/wrong-arguments
Wrong number of arguments for format
CWE-628
Python
py/call/wrong-arguments
Wrong number of arguments in a call
CWE-639
C#
cs/web/insecure-direct-object-reference
Insecure Direct Object Reference
CWE-639
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-639
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-640
Go
go/email-injection
Email content injection
CWE-640
JavaScript/TypeScript
js/host-header-forgery-in-email-generation
Host header poisoning in email generation
CWE-642
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-642
C#
cs/web/html-hidden-input
Use of HTMLInputHidden
CWE-642
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-642
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-642
Go
go/path-injection
Uncontrolled data used in path expression
CWE-642
Java/Kotlin
java/path-injection
Uncontrolled data used in path expression
CWE-642
Java/Kotlin
java/file-path-injection
File Path Injection
CWE-642
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-642
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-642
Python
py/path-injection
Uncontrolled data used in path expression
CWE-642
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-642
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-642
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-642
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-642
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-642
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-642
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-643
C#
cs/xml/xpath-injection
XPath injection
CWE-643
Go
go/xml/xpath-injection
XPath injection
CWE-643
Java/Kotlin
java/xml/xpath-injection
XPath injection
CWE-643
JavaScript/TypeScript
js/xpath-injection
XPath injection
CWE-643
JavaScript/TypeScript
js/xpath-injection-more-sources
XPath injection with additional heuristic sources
CWE-643
Python
py/xpath-injection
XPath query built from user-controlled sources
CWE-643
Python
py/xslt-injection
XSLT query built from user-controlled sources
CWE-643
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-652
Java/Kotlin
java/xquery-injection
XQuery query built from user-controlled sources
CWE-657
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-657
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-657
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-657
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-657
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-657
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-657
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-657
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-657
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-657
JavaScript/TypeScript
js/remote-property-injection
Remote property injection
CWE-657
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-657
JavaScript/TypeScript
js/remote-property-injection-more-sources
Remote property injection with additional heuristic sources
CWE-657
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-657
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-657
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-657
Swift
swift/constant-password
Constant password
CWE-657
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-662
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-662
C/C++
cpp/twice-locked
Mutex locked twice
CWE-662
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-662
C#
cs/unsafe-sync-on-field
Futile synchronization on field
CWE-662
C#
cs/inconsistent-lock-sequence
Inconsistent lock sequence
CWE-662
C#
cs/lock-this
Locking the 'this' object in a lock statement
CWE-662
C#
cs/locked-wait
A lock is held during a wait
CWE-662
C#
cs/unsynchronized-getter
Inconsistently synchronized property
CWE-662
C#
cs/unsafe-double-checked-lock
Double-checked lock is not thread-safe
CWE-662
C#
cs/unsynchronized-static-access
Unsynchronized access to static collection member in non-static context
CWE-662
Java/Kotlin
java/ejb/synchronization
EJB uses synchronization
CWE-662
Java/Kotlin
java/wait-on-condition-interface
Wait on condition
CWE-662
Java/Kotlin
java/call-to-thread-run
Direct call to a run() method
CWE-662
Java/Kotlin
java/unsafe-double-checked-locking
Double-checked locking is not thread-safe
CWE-662
Java/Kotlin
java/unsafe-double-checked-locking-init-order
Race condition in double-checked locking object initialization
CWE-662
Java/Kotlin
java/unsafe-sync-on-field
Futile synchronization on field
CWE-662
Java/Kotlin
java/inconsistent-field-synchronization
Inconsistent synchronization for field
CWE-662
Java/Kotlin
java/lazy-initialization
Incorrect lazy initialization of a static field
CWE-662
Java/Kotlin
java/non-sync-override
Non-synchronized override of synchronized method
CWE-662
Java/Kotlin
java/notify-instead-of-notify-all
notify instead of notifyAll
CWE-662
Java/Kotlin
java/sleep-with-lock-held
Sleep with lock held
CWE-662
Java/Kotlin
java/sync-on-boxed-types
Synchronization on boxed types or strings
CWE-662
Java/Kotlin
java/unsynchronized-getter
Inconsistent synchronization of getter and setter
CWE-662
Java/Kotlin
java/inconsistent-sync-writeobject
Inconsistent synchronization for writeObject()
CWE-662
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-662
Java/Kotlin
java/wait-with-two-locks
Wait with two locks held
CWE-662
Java/Kotlin
java/lock-order-inconsistency
Lock order inconsistency
CWE-664
GitHub Actions
actions/code-injection/critical
Code injection
CWE-664
GitHub Actions
actions/code-injection/medium
Code injection
CWE-664
GitHub Actions
actions/improper-access-control
Improper Access Control
CWE-664
GitHub Actions
actions/excessive-secrets-exposure
Excessive Secrets Exposure
CWE-664
GitHub Actions
actions/secrets-in-artifacts
Storage of sensitive information in GitHub Actions artifact
CWE-664
GitHub Actions
actions/unmasked-secret-exposure
Unmasked Secret Exposure
CWE-664
GitHub Actions
actions/cache-poisoning/code-injection
Cache Poisoning via low-privileged code injection
CWE-664
GitHub Actions
actions/artifact-poisoning/critical
Artifact poisoning
CWE-664
GitHub Actions
actions/artifact-poisoning/medium
Artifact poisoning
CWE-664
GitHub Actions
actions/unpinned-tag
Unpinned tag for a non-immutable Action in workflow
CWE-664
GitHub Actions
actions/untrusted-checkout/critical
Checkout of untrusted code in a privileged context
CWE-664
GitHub Actions
actions/untrusted-checkout/high
Checkout of untrusted code in trusted context
CWE-664
GitHub Actions
actions/untrusted-checkout/medium
Checkout of untrusted code in trusted context
CWE-664
GitHub Actions
actions/secret-exfiltration
Secret exfiltration
CWE-664
GitHub Actions
actions/pr-on-self-hosted-runner
Pull Request code execution on self-hosted runner
CWE-664
GitHub Actions
actions/artifact-poisoning/path-traversal
Artifact Poisoning (Path Traversal)
CWE-664
GitHub Actions
actions/unversioned-immutable-action
Unversioned Immutable Action
CWE-664
GitHub Actions
actions/request-forgery
Uncontrolled data used in network request
CWE-664
C/C++
cpp/catch-missing-free
Leaky catch
CWE-664
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-664
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-664
C/C++
cpp/double-free
Potential double free
CWE-664
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-664
C/C++
cpp/file-never-closed
Open file is not closed
CWE-664
C/C++
cpp/global-use-before-init
Global variable may be used before initialization
CWE-664
C/C++
cpp/initialization-not-run
Initialization code not run
CWE-664
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-664
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-664
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-664
C/C++
cpp/not-initialised
Variable not initialized before use
CWE-664
C/C++
cpp/use-after-free
Potential use after free
CWE-664
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-664
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-664
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-664
C/C++
cpp/alloca-in-loop
Call to alloca in a loop
CWE-664
C/C++
cpp/improper-null-termination
Potential improper null termination
CWE-664
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-664
C/C++
cpp/uninitialized-local
Potentially uninitialized local variable
CWE-664
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-664
C/C++
cpp/self-assignment-check
Self assignment check
CWE-664
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-664
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-664
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-664
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-664
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-664
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-664
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-664
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-664
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-664
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-664
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-664
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-664
C/C++
cpp/unsafe-create-process-call
NULL application name with an unquoted path in call to CreateProcess
CWE-664
C/C++
cpp/conditionally-uninitialized-variable
Conditionally uninitialized variable
CWE-664
C/C++
cpp/system-data-exposure
Exposure of system data to an unauthorized control sphere
CWE-664
C/C++
cpp/potential-system-data-exposure
Potential exposure of sensitive system data to an unauthorized control sphere
CWE-664
C/C++
cpp/external-entity-expansion
XML external entity expansion
CWE-664
C/C++
cpp/incorrect-string-type-conversion
Cast from char to wchar_t
CWE-664
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-664
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-664
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-664
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-664
C/C++
cpp/twice-locked
Mutex locked twice
CWE-664
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-664
C/C++
cpp/type-confusion
Type confusion
CWE-664
C/C++
cpp/work-with-file-without-permissions-rights
Writing to a file without setting permissions
CWE-664
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-664
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-664
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-664
C/C++
cpp/pam-auth-bypass
PAM Authorization bypass
CWE-664
C/C++
cpp/private-cleartext-write
Exposure of private information
CWE-664
C/C++
cpp/insecure-generation-of-filename
Insecure generation of filenames
CWE-664
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-664
C/C++
cpp/data-decompression-bomb
User-controlled file decompression
CWE-664
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-664
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-664
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-664
C/C++
cpp/double-release
Errors When Double Release
CWE-664
C/C++
cpp/improper-check-return-value-scanf
Improper check of return value of scanf
CWE-664
C/C++
cpp/resource-not-released-in-destructor
Resource not released in destructor
CWE-664
C#
cs/dispose-not-called-on-throw
Dispose may not be called if an exception is thrown during execution
CWE-664
C#
cs/member-not-disposed
Missing Dispose call
CWE-664
C#
cs/missing-dispose-method
Missing Dispose method
CWE-664
C#
cs/local-not-disposed
Missing Dispose call on local IDisposable
CWE-664
C#
cs/class-name-comparison
Erroneous class compare
CWE-664
C#
cs/cast-from-abstract-to-concrete-collection
Cast from abstract to concrete collection
CWE-664
C#
cs/expose-implementation
Exposing internal representation
CWE-664
C#
cs/static-array
Array constant vulnerable to change
CWE-664
C#
cs/web/debug-code
ASP.NET: leftover debug code
CWE-664
C#
cs/web/html-hidden-input
Use of HTMLInputHidden
CWE-664
C#
cs/unsafe-sync-on-field
Futile synchronization on field
CWE-664
C#
cs/inconsistent-lock-sequence
Inconsistent lock sequence
CWE-664
C#
cs/lock-this
Locking the 'this' object in a lock statement
CWE-664
C#
cs/locked-wait
A lock is held during a wait
CWE-664
C#
cs/unsynchronized-getter
Inconsistently synchronized property
CWE-664
C#
cs/unsafe-double-checked-lock
Double-checked lock is not thread-safe
CWE-664
C#
cs/unsynchronized-static-access
Unsynchronized access to static collection member in non-static context
CWE-664
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-664
C#
cs/password-in-configuration
Password in configuration file
CWE-664
C#
cs/unassigned-field
Field is never assigned a non-default value
CWE-664
C#
cs/web/file-upload
Use of file upload
CWE-664
C#
cs/catch-of-all-exceptions
Generic catch clause
CWE-664
C#
cs/loss-of-precision
Possible loss of precision
CWE-664
C#
cs/web/debug-binary
Creating an ASP.NET debug binary may reveal sensitive information
CWE-664
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-664
C#
cs/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-664
C#
cs/code-injection
Improper control of generation of code
CWE-664
C#
cs/sensitive-data-transmission
Information exposure through transmitted data
CWE-664
C#
cs/information-exposure-through-exception
Information exposure through an exception
CWE-664
C#
cs/web/missing-function-level-access-control
Missing function level access control
CWE-664
C#
cs/cleartext-storage-of-sensitive-information
Clear text storage of sensitive information
CWE-664
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-664
C#
cs/exposure-of-sensitive-information
Exposure of private information
CWE-664
C#
cs/session-reuse
Failure to abandon session
CWE-664
C#
cs/web/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-664
C#
cs/deserialized-delegate
Deserialized delegate
CWE-664
C#
cs/unsafe-deserialization
Unsafe deserializer
CWE-664
C#
cs/unsafe-deserialization-untrusted-input
Deserialization of untrusted data
CWE-664
C#
cs/web/directory-browse-enabled
ASP.NET config file enables directory browsing
CWE-664
C#
cs/web/unvalidated-url-redirection
URL redirection from remote source
CWE-664
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-664
C#
cs/insecure-xml-read
XML is read insecurely
CWE-664
C#
cs/web/insecure-direct-object-reference
Insecure Direct Object Reference
CWE-664
C#
cs/redos
Denial of Service from comparison of user input against expensive regex
CWE-664
C#
cs/regex-injection
Regular expression injection
CWE-664
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-664
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-664
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-664
C#
cs/web/broad-cookie-domain
Cookie security: overly broad domain
CWE-664
C#
cs/web/broad-cookie-path
Cookie security: overly broad path
CWE-664
C#
cs/web/persistent-cookie
Cookie security: persistent cookie
CWE-664
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-664
C#
cs/request-forgery
Server-side request forgery
CWE-664
Go
go/shift-out-of-range
Shift out of range
CWE-664
Go
go/path-injection
Uncontrolled data used in path expression
CWE-664
Go
go/unsafe-unzip-symlink
Arbitrary file write extracting an archive containing symbolic links
CWE-664
Go
go/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-664
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-664
Go
go/stack-trace-exposure
Information exposure through a stack trace
CWE-664
Go
go/clear-text-logging
Clear-text logging of sensitive information
CWE-664
Go
go/insecure-hostkeycallback
Use of insecure HostKeyCallback implementation
CWE-664
Go
go/bad-redirect-check
Bad redirect check
CWE-664
Go
go/unvalidated-url-redirection
Open URL redirect
CWE-664
Go
go/email-injection
Email content injection
CWE-664
Go
go/incorrect-integer-conversion
Incorrect conversion between integer types
CWE-664
Go
go/uncontrolled-allocation-size
Slice memory allocation with excessive size value
CWE-664
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-664
Go
go/request-forgery
Uncontrolled data used in network request
CWE-664
Go
go/timing-attack
Timing attacks due to comparison of sensitive secrets
CWE-664
Go
go/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-664
Go
go/improper-ldap-auth
Improper LDAP Authentication
CWE-664
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-664
Go
go/uncontrolled-file-decompression
Uncontrolled file decompression
CWE-664
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-664
Go
go/ssrf
Uncontrolled data used in network request
CWE-664
Go
go/cors-misconfiguration
CORS misconfiguration
CWE-664
Java/Kotlin
java/ejb/synchronization
EJB uses synchronization
CWE-664
Java/Kotlin
java/implicit-cast-in-compound-assignment
Implicit narrowing conversion in compound assignment
CWE-664
Java/Kotlin
java/integer-multiplication-cast-to-long
Result of multiplication cast to wider type
CWE-664
Java/Kotlin
java/missing-call-to-super-clone
Missing super clone
CWE-664
Java/Kotlin
java/wait-on-condition-interface
Wait on condition
CWE-664
Java/Kotlin
java/call-to-thread-run
Direct call to a run() method
CWE-664
Java/Kotlin
java/unsafe-double-checked-locking
Double-checked locking is not thread-safe
CWE-664
Java/Kotlin
java/unsafe-double-checked-locking-init-order
Race condition in double-checked locking object initialization
CWE-664
Java/Kotlin
java/unsafe-sync-on-field
Futile synchronization on field
CWE-664
Java/Kotlin
java/inconsistent-field-synchronization
Inconsistent synchronization for field
CWE-664
Java/Kotlin
java/lazy-initialization
Incorrect lazy initialization of a static field
CWE-664
Java/Kotlin
java/non-sync-override
Non-synchronized override of synchronized method
CWE-664
Java/Kotlin
java/notify-instead-of-notify-all
notify instead of notifyAll
CWE-664
Java/Kotlin
java/sleep-with-lock-held
Sleep with lock held
CWE-664
Java/Kotlin
java/sync-on-boxed-types
Synchronization on boxed types or strings
CWE-664
Java/Kotlin
java/unsynchronized-getter
Inconsistent synchronization of getter and setter
CWE-664
Java/Kotlin
java/inconsistent-sync-writeobject
Inconsistent synchronization for writeObject()
CWE-664
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-664
Java/Kotlin
java/wait-with-two-locks
Wait with two locks held
CWE-664
Java/Kotlin
java/missing-super-finalize
Finalizer inconsistency
CWE-664
Java/Kotlin
java/input-resource-leak
Potential input resource leak
CWE-664
Java/Kotlin
java/database-resource-leak
Potential database resource leak
CWE-664
Java/Kotlin
java/output-resource-leak
Potential output resource leak
CWE-664
Java/Kotlin
java/impossible-array-cast
Impossible array cast
CWE-664
Java/Kotlin
java/path-injection
Uncontrolled data used in path expression
CWE-664
Java/Kotlin
java/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-664
Java/Kotlin
java/partial-path-traversal
Partial path traversal vulnerability
CWE-664
Java/Kotlin
java/partial-path-traversal-from-remote
Partial path traversal vulnerability from remote
CWE-664
Java/Kotlin
java/exec-tainted-environment
Building a command with an injected environment variable
CWE-664
Java/Kotlin
java/android/arbitrary-apk-installation
Android APK installation
CWE-664
Java/Kotlin
java/groovy-injection
Groovy Language injection
CWE-664
Java/Kotlin
java/insecure-bean-validation
Insecure Bean Validation
CWE-664
Java/Kotlin
java/jexl-expression-injection
Expression language injection (JEXL)
CWE-664
Java/Kotlin
java/mvel-expression-injection
Expression language injection (MVEL)
CWE-664
Java/Kotlin
java/spel-expression-injection
Expression language injection (Spring)
CWE-664
Java/Kotlin
java/server-side-template-injection
Server-side template injection
CWE-664
Java/Kotlin
java/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-664
Java/Kotlin
java/android/sensitive-notification
Exposure of sensitive information to notifications
CWE-664
Java/Kotlin
java/android/sensitive-text
Exposure of sensitive information to UI text views
CWE-664
Java/Kotlin
java/android/websettings-allow-content-access
Android WebView settings allows access to content links
CWE-664
Java/Kotlin
java/android/websettings-file-access
Android WebSettings file access
CWE-664
Java/Kotlin
java/spring-boot-exposed-actuators
Exposed Spring Boot actuators
CWE-664
Java/Kotlin
java/spring-boot-exposed-actuators-config
Exposed Spring Boot actuators in configuration file
CWE-664
Java/Kotlin
java/local-temp-file-or-directory-information-disclosure
Local information disclosure in a temporary directory
CWE-664
Java/Kotlin
java/error-message-exposure
Information exposure through an error message
CWE-664
Java/Kotlin
java/stack-trace-exposure
Information exposure through a stack trace
CWE-664
Java/Kotlin
java/android/intent-uri-permission-manipulation
Intent URI permission manipulation
CWE-664
Java/Kotlin
java/unsafe-cert-trust
Unsafe certificate trust
CWE-664
Java/Kotlin
java/android/insecure-local-key-gen
Insecurely generated keys for local authentication
CWE-664
Java/Kotlin
java/android/insecure-local-authentication
Insecure local authentication
CWE-664
Java/Kotlin
java/insecure-smtp-ssl
Insecure JavaMail SSL Configuration
CWE-664
Java/Kotlin
java/unsafe-hostname-verification
Unsafe hostname verification
CWE-664
Java/Kotlin
java/android/backup-enabled
Application backup allowed
CWE-664
Java/Kotlin
java/android/cleartext-storage-database
Cleartext storage of sensitive information using a local database on Android
CWE-664
Java/Kotlin
java/android/cleartext-storage-filesystem
Cleartext storage of sensitive information in the Android filesystem
CWE-664
Java/Kotlin
java/cleartext-storage-in-class
Cleartext storage of sensitive information using storable class
CWE-664
Java/Kotlin
java/cleartext-storage-in-cookie
Cleartext storage of sensitive information in cookie
CWE-664
Java/Kotlin
java/cleartext-storage-in-properties
Cleartext storage of sensitive information using 'Properties' class
CWE-664
Java/Kotlin
java/android/cleartext-storage-shared-prefs
Cleartext storage of sensitive information using SharedPreferences on Android
CWE-664
Java/Kotlin
java/socket-auth-race-condition
Race condition in socket authentication
CWE-664
Java/Kotlin
java/android/unsafe-content-uri-resolution
Uncontrolled data used in content resolution
CWE-664
Java/Kotlin
java/android/fragment-injection
Android fragment injection
CWE-664
Java/Kotlin
java/android/fragment-injection-preference-activity
Android fragment injection in PreferenceActivity
CWE-664
Java/Kotlin
java/android/debuggable-attribute-enabled
Android debuggable attribute enabled
CWE-664
Java/Kotlin
java/android/webview-debugging-enabled
Android Webview debugging enabled
CWE-664
Java/Kotlin
java/trust-boundary-violation
Trust boundary violation
CWE-664
Java/Kotlin
java/unsafe-deserialization
Deserialization of user-controlled data
CWE-664
Java/Kotlin
java/insecure-basic-auth
Insecure basic authentication
CWE-664
Java/Kotlin
java/insecure-ldap-auth
Insecure LDAP authentication
CWE-664
Java/Kotlin
java/android/sensitive-keyboard-cache
Android sensitive keyboard cache
CWE-664
Java/Kotlin
java/sensitive-log
Insertion of sensitive information into log files
CWE-664
Java/Kotlin
java/unvalidated-url-forward
URL forward from a remote source
CWE-664
Java/Kotlin
java/unvalidated-url-redirection
URL redirection from remote source
CWE-664
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-664
Java/Kotlin
java/tainted-numeric-cast
User-controlled data in numeric cast
CWE-664
Java/Kotlin
java/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-664
Java/Kotlin
java/redos
Inefficient regular expression
CWE-664
Java/Kotlin
java/regex-injection
Regular expression injection
CWE-664
Java/Kotlin
java/world-writable-file-read
Reading from a world writable file
CWE-664
Java/Kotlin
java/android/unsafe-android-webview-fetch
Unsafe resource fetching in Android WebView
CWE-664
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-664
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-664
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-664
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-664
Java/Kotlin
java/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-664
Java/Kotlin
java/tainted-permissions-check
User-controlled data used in permissions check
CWE-664
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-664
Java/Kotlin
java/lock-order-inconsistency
Lock order inconsistency
CWE-664
Java/Kotlin
java/ssrf
Server-side request forgery
CWE-664
Java/Kotlin
java/improper-intent-verification
Improper verification of intent by broadcast receiver
CWE-664
Java/Kotlin
java/android/incomplete-provider-permissions
Missing read or write permission in a content provider
CWE-664
Java/Kotlin
java/android/implicitly-exported-component
Implicitly exported Android component
CWE-664
Java/Kotlin
java/android/implicit-pendingintents
Use of implicit PendingIntents
CWE-664
Java/Kotlin
java/android/sensitive-communication
Leaking sensitive information through an implicit Intent
CWE-664
Java/Kotlin
java/android/sensitive-result-receiver
Leaking sensitive information through a ResultReceiver
CWE-664
Java/Kotlin
java/android/intent-redirection
Android Intent redirection
CWE-664
Java/Kotlin
java/empty-finalizer
Empty body of finalizer
CWE-664
Java/Kotlin
java/unassigned-field
Field is never assigned a non-null value
CWE-664
Java/Kotlin
java/overly-general-catch
Overly-general catch clause
CWE-664
Java/Kotlin
java/abstract-to-concrete-cast
Cast from abstract to concrete collection
CWE-664
Java/Kotlin
java/internal-representation-exposure
Exposing internal representation
CWE-664
Java/Kotlin
java/static-array
Array constant vulnerable to change
CWE-664
Java/Kotlin
java/log4j-injection
Potential Log4J LDAP JNDI injection (CVE-2021-44228)
CWE-664
Java/Kotlin
java/openstream-called-on-tainted-url
openStream called on URLs created from remote source
CWE-664
Java/Kotlin
java/file-path-injection
File Path Injection
CWE-664
Java/Kotlin
java/beanshell-injection
BeanShell injection
CWE-664
Java/Kotlin
java/android-insecure-dex-loading
Insecure loading of an Android Dex File
CWE-664
Java/Kotlin
java/jshell-injection
JShell injection
CWE-664
Java/Kotlin
java/javaee-expression-injection
Jakarta Expression Language injection
CWE-664
Java/Kotlin
java/jython-injection
Injection in Jython
CWE-664
Java/Kotlin
java/unsafe-eval
Injection in Java Script Engine
CWE-664
Java/Kotlin
java/spring-view-manipulation-implicit
Spring Implicit View Manipulation
CWE-664
Java/Kotlin
java/spring-view-manipulation
Spring View Manipulation
CWE-664
Java/Kotlin
java/insecure-webview-resource-response
Insecure Android WebView Resource Response
CWE-664
Java/Kotlin
java/sensitive-android-file-leak
Leaking sensitive Android file
CWE-664
Java/Kotlin
java/possible-timing-attack-against-signature
Possible timing attack against signature validation
CWE-664
Java/Kotlin
java/timing-attack-against-headers-value
Timing attack against header value
CWE-664
Java/Kotlin
java/timing-attack-against-signature
Timing attack against signature validation
CWE-664
Java/Kotlin
java/ignored-hostname-verification
Ignored result of hostname verification
CWE-664
Java/Kotlin
java/insecure-ldaps-endpoint
Insecure LDAPS Endpoint Configuration
CWE-664
Java/Kotlin
java/disabled-certificate-revocation-checking
Disabled certificate revocation checking
CWE-664
Java/Kotlin
java/unvalidated-cors-origin-set
CORS is derived from untrusted input
CWE-664
Java/Kotlin
java/local-thread-resource-abuse
Uncontrolled thread resource consumption from local input source
CWE-664
Java/Kotlin
java/thread-resource-abuse
Uncontrolled thread resource consumption
CWE-664
Java/Kotlin
java/android/unsafe-reflection
Load 3rd party classes or code ('unsafe reflection') without signature check
CWE-664
Java/Kotlin
java/unsafe-reflection
Use of externally-controlled input to select classes or code ('unsafe reflection')
CWE-664
Java/Kotlin
java/main-method-in-enterprise-bean
Main Method in Enterprise Java Bean
CWE-664
Java/Kotlin
java/main-method-in-web-components
Main Method in Java EE Web Components
CWE-664
Java/Kotlin
java/struts-development-mode
Apache Struts development mode enabled
CWE-664
Java/Kotlin
java/unsafe-deserialization-rmi
Unsafe deserialization in a remotely callable method
CWE-664
Java/Kotlin
java/unsafe-deserialization-spring-exporter-in-configuration-class
Unsafe deserialization with Spring's remote service exporters
CWE-664
Java/Kotlin
java/unsafe-deserialization-spring-exporter-in-xml-configuration
Unsafe deserialization with Spring's remote service exporters
CWE-664
Java/Kotlin
java/uncontrolled-file-decompression
Uncontrolled file decompression
CWE-664
Java/Kotlin
java/server-directory-listing
Directories and files exposure
CWE-664
Java/Kotlin
java/credentials-in-properties
Cleartext Credentials in Properties File
CWE-664
Java/Kotlin
java/password-in-configuration
Password in configuration file
CWE-664
Java/Kotlin
java/sensitive-query-with-get
Sensitive GET Query
CWE-664
Java/Kotlin
java/spring-unvalidated-url-redirection
Spring url redirection from remote source
CWE-664
Java/Kotlin
java/permissive-dot-regex
URL matched by permissive . in a regular expression
CWE-664
Java/Kotlin
java/insecure-rmi-jmx-server-initialization
InsecureRmiJmxAuthenticationEnvironment
CWE-664
Java/Kotlin
java/incorrect-url-verification
Incorrect URL verification
CWE-664
JavaScript/TypeScript
js/alert-call
Invocation of alert
CWE-664
JavaScript/TypeScript
js/unsafe-external-link
Potentially unsafe external link
CWE-664
JavaScript/TypeScript
js/enabling-electron-insecure-content
Enabling Electron allowRunningInsecureContent
CWE-664
JavaScript/TypeScript
js/enabling-electron-renderer-node-integration
Enabling Node.js integration for Electron web content renderers
CWE-664
JavaScript/TypeScript
js/implicit-operand-conversion
Implicit operand conversion
CWE-664
JavaScript/TypeScript
js/shift-out-of-range
Shift out of range
CWE-664
JavaScript/TypeScript
js/debugger-statement
Use of debugger statement
CWE-664
JavaScript/TypeScript
js/invalid-prototype-value
Invalid prototype value
CWE-664
JavaScript/TypeScript
js/property-assignment-on-primitive
Assignment to property of primitive value
CWE-664
JavaScript/TypeScript
js/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-664
JavaScript/TypeScript
js/redos
Inefficient regular expression
CWE-664
JavaScript/TypeScript
js/missing-origin-check
Missing origin verification in postMessage handler
CWE-664
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-664
JavaScript/TypeScript
js/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-664
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-664
JavaScript/TypeScript
js/code-injection
Code injection
CWE-664
JavaScript/TypeScript
js/bad-code-sanitization
Improper code sanitization
CWE-664
JavaScript/TypeScript
js/unsafe-code-construction
Unsafe code constructed from library input
CWE-664
JavaScript/TypeScript
js/unsafe-dynamic-method-access
Unsafe dynamic method access
CWE-664
JavaScript/TypeScript
js/case-sensitive-middleware-path
Case-sensitive middleware path
CWE-664
JavaScript/TypeScript
js/file-access-to-http
File data in outbound network request
CWE-664
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-664
JavaScript/TypeScript
js/cross-window-information-leak
Cross-window communication with unrestricted target origin
CWE-664
JavaScript/TypeScript
js/stack-trace-exposure
Information exposure through a stack trace
CWE-664
JavaScript/TypeScript
js/disabling-certificate-validation
Disabling certificate validation
CWE-664
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-664
JavaScript/TypeScript
js/build-artifact-leak
Storage of sensitive information in build artifact
CWE-664
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-664
JavaScript/TypeScript
js/clear-text-storage-of-sensitive-data
Clear text storage of sensitive information
CWE-664
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-664
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-664
JavaScript/TypeScript
js/insecure-temporary-file
Insecure temporary file
CWE-664
JavaScript/TypeScript
js/session-fixation
Failure to abandon session
CWE-664
JavaScript/TypeScript
js/resource-exhaustion-from-deep-object-traversal
Resources exhaustion from deep object traversal
CWE-664
JavaScript/TypeScript
js/remote-property-injection
Remote property injection
CWE-664
JavaScript/TypeScript
js/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-664
JavaScript/TypeScript
js/unsafe-deserialization
Deserialization of user-controlled data
CWE-664
JavaScript/TypeScript
js/sensitive-get-query
Sensitive data read from GET request
CWE-664
JavaScript/TypeScript
js/client-side-unvalidated-url-redirection
Client-side URL redirect
CWE-664
JavaScript/TypeScript
js/server-side-unvalidated-url-redirection
Server-side URL redirect
CWE-664
JavaScript/TypeScript
js/xxe
XML external entity expansion
CWE-664
JavaScript/TypeScript
js/clear-text-cookie
Clear text transmission of sensitive cookie
CWE-664
JavaScript/TypeScript
js/host-header-forgery-in-email-generation
Host header poisoning in email generation
CWE-664
JavaScript/TypeScript
js/regex-injection
Regular expression injection
CWE-664
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-664
JavaScript/TypeScript
js/resource-exhaustion
Resource exhaustion
CWE-664
JavaScript/TypeScript
js/xml-bomb
XML internal entity expansion
CWE-664
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-664
JavaScript/TypeScript
js/user-controlled-bypass
User-controlled bypass of security check
CWE-664
JavaScript/TypeScript
js/different-kinds-comparison-bypass
Comparison of user-controlled data of different kinds
CWE-664
JavaScript/TypeScript
js/insecure-download
Download of sensitive file through insecure connection
CWE-664
JavaScript/TypeScript
js/functionality-from-untrusted-domain
Untrusted domain used in script or other content
CWE-664
JavaScript/TypeScript
js/functionality-from-untrusted-source
Inclusion of functionality from an untrusted source
CWE-664
JavaScript/TypeScript
js/type-confusion-through-parameter-tampering
Type confusion through parameter tampering
CWE-664
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-664
JavaScript/TypeScript
js/http-to-file-access
Network data written to file
CWE-664
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-664
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-664
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-664
JavaScript/TypeScript
js/client-side-request-forgery
Client-side request forgery
CWE-664
JavaScript/TypeScript
js/request-forgery
Server-side request forgery
CWE-664
JavaScript/TypeScript
js/cors-permissive-configuration
Permissive CORS configuration
CWE-664
JavaScript/TypeScript
js/code-injection-dynamic-import
Code injection from dynamically imported code
CWE-664
JavaScript/TypeScript
js/user-controlled-data-decompression
User-controlled file decompression
CWE-664
JavaScript/TypeScript
javascript/ssrf
Uncontrolled data used in network request
CWE-664
JavaScript/TypeScript
js/code-injection-more-sources
Code injection with additional heuristic sources
CWE-664
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-664
JavaScript/TypeScript
js/remote-property-injection-more-sources
Remote property injection with additional heuristic sources
CWE-664
JavaScript/TypeScript
js/unsafe-deserialization-more-sources
Deserialization of user-controlled data with additional heuristic sources
CWE-664
JavaScript/TypeScript
js/xxe-more-sources
XML external entity expansion with additional heuristic sources
CWE-664
JavaScript/TypeScript
js/regex-injection-more-sources
Regular expression injection with additional heuristic sources
CWE-664
JavaScript/TypeScript
js/resource-exhaustion-more-sources
Resource exhaustion with additional heuristic sources
CWE-664
JavaScript/TypeScript
js/xml-bomb-more-sources
XML internal entity expansion with additional heuristic sources
CWE-664
JavaScript/TypeScript
js/user-controlled-bypass-more-sources
User-controlled bypass of security check with additional heuristic sources
CWE-664
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-664
Python
py/catch-base-exception
Except block handles 'BaseException'
CWE-664
Python
py/implicit-string-concatenation-in-list
Implicit string concatenation in a list
CWE-664
Python
py/use-of-input
'input' function used in Python 2
CWE-664
Python
py/file-not-closed
File is not always closed
CWE-664
Python
py/bind-socket-all-network-interfaces
Binding a socket to all network interfaces
CWE-664
Python
py/path-injection
Uncontrolled data used in path expression
CWE-664
Python
py/tarslip
Arbitrary file write during tarfile extraction
CWE-664
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-664
Python
py/code-injection
Code injection
CWE-664
Python
py/stack-trace-exposure
Information exposure through an exception
CWE-664
Python
py/flask-debug
Flask app is run in debug mode
CWE-664
Python
py/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-664
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-664
Python
py/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-664
Python
py/insecure-temporary-file
Insecure temporary file
CWE-664
Python
py/unsafe-deserialization
Deserialization of user-controlled data
CWE-664
Python
py/url-redirection
URL redirection from remote source
CWE-664
Python
py/xxe
XML external entity expansion
CWE-664
Python
py/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-664
Python
py/redos
Inefficient regular expression
CWE-664
Python
py/regex-injection
Regular expression injection
CWE-664
Python
py/overly-permissive-file
Overly permissive file permissions
CWE-664
Python
py/xml-bomb
XML internal entity expansion
CWE-664
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-664
Python
py/full-ssrf
Full server-side request forgery
CWE-664
Python
py/partial-ssrf
Partial server-side request forgery
CWE-664
Python
py/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-664
Python
py/tarslip-extended
Arbitrary file write during tarfile extraction
CWE-664
Python
py/unsafe-unpacking
Arbitrary file write during a tarball extraction from a user controlled source
CWE-664
Python
py/js2py-rce
JavaScript code execution
CWE-664
Python
py/possible-timing-attack-against-hash
Timing attack against Hash
CWE-664
Python
py/timing-attack-against-hash
Timing attack against Hash
CWE-664
Python
py/timing-attack-against-header-value
Timing attack against header value
CWE-664
Python
py/possible-timing-attack-sensitive-info
Timing attack against secret
CWE-664
Python
py/timing-attack-sensitive-info
Timing attack against secret
CWE-664
Python
py/flask-constant-secret-key
Initializing SECRET_KEY of Flask application with Constant value
CWE-664
Python
py/improper-ldap-auth
Improper LDAP Authentication
CWE-664
Python
py/decompression-bomb
Decompression Bomb
CWE-664
Python
py/insecure-ldap-auth
Python Insecure LDAP Authentication
CWE-664
Python
py/simple-xml-rpc-server-dos
SimpleXMLRPCServer denial of service
CWE-664
Python
py/unicode-dos
Denial of Service using Unicode Characters
CWE-664
Python
py/cors-misconfiguration-with-credentials
Cors misconfiguration with credentials
CWE-664
Ruby
rb/user-controlled-data-decompression
User-controlled file decompression
CWE-664
Ruby
rb/zip-slip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-664
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-664
Ruby
rb/unsafe-unsafeyamldeserialization
Deserialization of user-controlled yaml data
CWE-664
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-664
Ruby
rb/user-controlled-file-decompression
User-controlled file decompression
CWE-664
Ruby
rb/improper-ldap-auth
Improper LDAP Authentication
CWE-664
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-664
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-664
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-664
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-664
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-664
Ruby
rb/code-injection
Code injection
CWE-664
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-664
Ruby
rb/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-664
Ruby
rb/redos
Inefficient regular expression
CWE-664
Ruby
rb/regexp-injection
Regular expression injection
CWE-664
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-664
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-664
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-664
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-664
Ruby
rb/unsafe-deserialization
Deserialization of user-controlled data
CWE-664
Ruby
rb/sensitive-get-query
Sensitive data read from GET request
CWE-664
Ruby
rb/url-redirection
URL redirection from remote source
CWE-664
Ruby
rb/xxe
XML external entity expansion
CWE-664
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-664
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-664
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-664
Ruby
rb/insecure-download
Download of sensitive file through insecure connection
CWE-664
Ruby
rb/http-to-file-access
Network data written to file
CWE-664
Ruby
rb/insecure-mass-assignment
Insecure Mass Assignment
CWE-664
Ruby
rb/request-forgery
Server-side request forgery
CWE-664
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-664
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-664
Rust
rust/cleartext-storage-database
Cleartext storage of sensitive information in a database
CWE-664
Rust
rust/ctor-initialization
Bad 'ctor' initialization
CWE-664
Rust
rust/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-664
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-664
Rust
rust/access-after-lifetime-ended
Access of a pointer after its lifetime has ended
CWE-664
Rust
rust/access-invalid-pointer
Access of invalid pointer
CWE-664
Rust
rust/request-forgery
Server-side request forgery
CWE-664
Swift
swift/unsafe-unpacking
Arbitrary file write during a zip extraction from a user controlled source
CWE-664
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-664
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-664
Swift
swift/unsafe-js-eval
JavaScript Injection
CWE-664
Swift
swift/redos
Inefficient regular expression
CWE-664
Swift
swift/constant-password
Constant password
CWE-664
Swift
swift/cleartext-storage-database
Cleartext storage of sensitive information in a local database
CWE-664
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-664
Swift
swift/cleartext-storage-preferences
Cleartext storage of sensitive information in an application preference store
CWE-664
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-664
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-664
Swift
swift/regex-injection
Regular expression injection
CWE-665
C/C++
cpp/global-use-before-init
Global variable may be used before initialization
CWE-665
C/C++
cpp/initialization-not-run
Initialization code not run
CWE-665
C/C++
cpp/not-initialised
Variable not initialized before use
CWE-665
C/C++
cpp/alloca-in-loop
Call to alloca in a loop
CWE-665
C/C++
cpp/improper-null-termination
Potential improper null termination
CWE-665
C/C++
cpp/uninitialized-local
Potentially uninitialized local variable
CWE-665
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-665
C/C++
cpp/conditionally-uninitialized-variable
Conditionally uninitialized variable
CWE-665
C#
cs/unassigned-field
Field is never assigned a non-default value
CWE-665
Go
go/uncontrolled-allocation-size
Slice memory allocation with excessive size value
CWE-665
Java/Kotlin
java/exec-tainted-environment
Building a command with an injected environment variable
CWE-665
Java/Kotlin
java/unassigned-field
Field is never assigned a non-null value
CWE-665
Java/Kotlin
java/insecure-rmi-jmx-server-initialization
InsecureRmiJmxAuthenticationEnvironment
CWE-665
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-665
JavaScript/TypeScript
js/resource-exhaustion
Resource exhaustion
CWE-665
JavaScript/TypeScript
js/resource-exhaustion-more-sources
Resource exhaustion with additional heuristic sources
CWE-665
Python
py/implicit-string-concatenation-in-list
Implicit string concatenation in a list
CWE-665
Python
py/unicode-dos
Denial of Service using Unicode Characters
CWE-665
Rust
rust/ctor-initialization
Bad 'ctor' initialization
CWE-665
Rust
rust/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-666
C/C++
cpp/double-free
Potential double free
CWE-666
C/C++
cpp/use-after-free
Potential use after free
CWE-666
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-666
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-666
C/C++
cpp/self-assignment-check
Self assignment check
CWE-666
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-666
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-666
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-666
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-666
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-666
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-666
C/C++
cpp/double-release
Errors When Double Release
CWE-666
Rust
rust/access-after-lifetime-ended
Access of a pointer after its lifetime has ended
CWE-666
Rust
rust/access-invalid-pointer
Access of invalid pointer
CWE-667
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-667
C/C++
cpp/twice-locked
Mutex locked twice
CWE-667
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-667
C#
cs/locked-wait
A lock is held during a wait
CWE-667
C#
cs/unsafe-double-checked-lock
Double-checked lock is not thread-safe
CWE-667
Java/Kotlin
java/unsafe-double-checked-locking
Double-checked locking is not thread-safe
CWE-667
Java/Kotlin
java/unsafe-double-checked-locking-init-order
Race condition in double-checked locking object initialization
CWE-667
Java/Kotlin
java/lazy-initialization
Incorrect lazy initialization of a static field
CWE-667
Java/Kotlin
java/sleep-with-lock-held
Sleep with lock held
CWE-667
Java/Kotlin
java/unsynchronized-getter
Inconsistent synchronization of getter and setter
CWE-667
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-667
Java/Kotlin
java/wait-with-two-locks
Wait with two locks held
CWE-667
Java/Kotlin
java/lock-order-inconsistency
Lock order inconsistency
CWE-668
GitHub Actions
actions/secret-exfiltration
Secret exfiltration
CWE-668
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-668
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-668
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-668
C/C++
cpp/unsafe-create-process-call
NULL application name with an unquoted path in call to CreateProcess
CWE-668
C/C++
cpp/system-data-exposure
Exposure of system data to an unauthorized control sphere
CWE-668
C/C++
cpp/potential-system-data-exposure
Potential exposure of sensitive system data to an unauthorized control sphere
CWE-668
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-668
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-668
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-668
C/C++
cpp/work-with-file-without-permissions-rights
Writing to a file without setting permissions
CWE-668
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-668
C/C++
cpp/private-cleartext-write
Exposure of private information
CWE-668
C/C++
cpp/insecure-generation-of-filename
Insecure generation of filenames
CWE-668
C#
cs/static-array
Array constant vulnerable to change
CWE-668
C#
cs/web/html-hidden-input
Use of HTMLInputHidden
CWE-668
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-668
C#
cs/password-in-configuration
Password in configuration file
CWE-668
C#
cs/web/debug-binary
Creating an ASP.NET debug binary may reveal sensitive information
CWE-668
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-668
C#
cs/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-668
C#
cs/sensitive-data-transmission
Information exposure through transmitted data
CWE-668
C#
cs/information-exposure-through-exception
Information exposure through an exception
CWE-668
C#
cs/cleartext-storage-of-sensitive-information
Clear text storage of sensitive information
CWE-668
C#
cs/exposure-of-sensitive-information
Exposure of private information
CWE-668
C#
cs/web/directory-browse-enabled
ASP.NET config file enables directory browsing
CWE-668
C#
cs/web/persistent-cookie
Cookie security: persistent cookie
CWE-668
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-668
Go
go/path-injection
Uncontrolled data used in path expression
CWE-668
Go
go/unsafe-unzip-symlink
Arbitrary file write extracting an archive containing symbolic links
CWE-668
Go
go/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-668
Go
go/stack-trace-exposure
Information exposure through a stack trace
CWE-668
Go
go/clear-text-logging
Clear-text logging of sensitive information
CWE-668
Go
go/timing-attack
Timing attacks due to comparison of sensitive secrets
CWE-668
Go
go/cors-misconfiguration
CORS misconfiguration
CWE-668
Java/Kotlin
java/path-injection
Uncontrolled data used in path expression
CWE-668
Java/Kotlin
java/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-668
Java/Kotlin
java/partial-path-traversal
Partial path traversal vulnerability
CWE-668
Java/Kotlin
java/partial-path-traversal-from-remote
Partial path traversal vulnerability from remote
CWE-668
Java/Kotlin
java/android/sensitive-notification
Exposure of sensitive information to notifications
CWE-668
Java/Kotlin
java/android/sensitive-text
Exposure of sensitive information to UI text views
CWE-668
Java/Kotlin
java/android/websettings-allow-content-access
Android WebView settings allows access to content links
CWE-668
Java/Kotlin
java/android/websettings-file-access
Android WebSettings file access
CWE-668
Java/Kotlin
java/spring-boot-exposed-actuators
Exposed Spring Boot actuators
CWE-668
Java/Kotlin
java/spring-boot-exposed-actuators-config
Exposed Spring Boot actuators in configuration file
CWE-668
Java/Kotlin
java/local-temp-file-or-directory-information-disclosure
Local information disclosure in a temporary directory
CWE-668
Java/Kotlin
java/error-message-exposure
Information exposure through an error message
CWE-668
Java/Kotlin
java/stack-trace-exposure
Information exposure through a stack trace
CWE-668
Java/Kotlin
java/insecure-basic-auth
Insecure basic authentication
CWE-668
Java/Kotlin
java/insecure-ldap-auth
Insecure LDAP authentication
CWE-668
Java/Kotlin
java/android/sensitive-keyboard-cache
Android sensitive keyboard cache
CWE-668
Java/Kotlin
java/sensitive-log
Insertion of sensitive information into log files
CWE-668
Java/Kotlin
java/unvalidated-url-forward
URL forward from a remote source
CWE-668
Java/Kotlin
java/world-writable-file-read
Reading from a world writable file
CWE-668
Java/Kotlin
java/android/implicit-pendingintents
Use of implicit PendingIntents
CWE-668
Java/Kotlin
java/android/sensitive-communication
Leaking sensitive information through an implicit Intent
CWE-668
Java/Kotlin
java/android/sensitive-result-receiver
Leaking sensitive information through a ResultReceiver
CWE-668
Java/Kotlin
java/static-array
Array constant vulnerable to change
CWE-668
Java/Kotlin
java/openstream-called-on-tainted-url
openStream called on URLs created from remote source
CWE-668
Java/Kotlin
java/file-path-injection
File Path Injection
CWE-668
Java/Kotlin
java/insecure-webview-resource-response
Insecure Android WebView Resource Response
CWE-668
Java/Kotlin
java/sensitive-android-file-leak
Leaking sensitive Android file
CWE-668
Java/Kotlin
java/possible-timing-attack-against-signature
Possible timing attack against signature validation
CWE-668
Java/Kotlin
java/timing-attack-against-headers-value
Timing attack against header value
CWE-668
Java/Kotlin
java/timing-attack-against-signature
Timing attack against signature validation
CWE-668
Java/Kotlin
java/server-directory-listing
Directories and files exposure
CWE-668
Java/Kotlin
java/credentials-in-properties
Cleartext Credentials in Properties File
CWE-668
Java/Kotlin
java/password-in-configuration
Password in configuration file
CWE-668
Java/Kotlin
java/sensitive-query-with-get
Sensitive GET Query
CWE-668
JavaScript/TypeScript
js/unsafe-external-link
Potentially unsafe external link
CWE-668
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-668
JavaScript/TypeScript
js/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-668
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-668
JavaScript/TypeScript
js/file-access-to-http
File data in outbound network request
CWE-668
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-668
JavaScript/TypeScript
js/cross-window-information-leak
Cross-window communication with unrestricted target origin
CWE-668
JavaScript/TypeScript
js/stack-trace-exposure
Information exposure through a stack trace
CWE-668
JavaScript/TypeScript
js/build-artifact-leak
Storage of sensitive information in build artifact
CWE-668
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-668
JavaScript/TypeScript
js/clear-text-storage-of-sensitive-data
Clear text storage of sensitive information
CWE-668
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-668
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-668
JavaScript/TypeScript
js/insecure-temporary-file
Insecure temporary file
CWE-668
JavaScript/TypeScript
js/sensitive-get-query
Sensitive data read from GET request
CWE-668
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-668
JavaScript/TypeScript
js/cors-permissive-configuration
Permissive CORS configuration
CWE-668
JavaScript/TypeScript
js/user-controlled-data-decompression
User-controlled file decompression
CWE-668
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-668
Python
py/bind-socket-all-network-interfaces
Binding a socket to all network interfaces
CWE-668
Python
py/path-injection
Uncontrolled data used in path expression
CWE-668
Python
py/tarslip
Arbitrary file write during tarfile extraction
CWE-668
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-668
Python
py/stack-trace-exposure
Information exposure through an exception
CWE-668
Python
py/flask-debug
Flask app is run in debug mode
CWE-668
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-668
Python
py/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-668
Python
py/insecure-temporary-file
Insecure temporary file
CWE-668
Python
py/overly-permissive-file
Overly permissive file permissions
CWE-668
Python
py/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-668
Python
py/tarslip-extended
Arbitrary file write during tarfile extraction
CWE-668
Python
py/unsafe-unpacking
Arbitrary file write during a tarball extraction from a user controlled source
CWE-668
Python
py/possible-timing-attack-against-hash
Timing attack against Hash
CWE-668
Python
py/timing-attack-against-hash
Timing attack against Hash
CWE-668
Python
py/timing-attack-against-header-value
Timing attack against header value
CWE-668
Python
py/possible-timing-attack-sensitive-info
Timing attack against secret
CWE-668
Python
py/timing-attack-sensitive-info
Timing attack against secret
CWE-668
Python
py/insecure-ldap-auth
Python Insecure LDAP Authentication
CWE-668
Python
py/cors-misconfiguration-with-credentials
Cors misconfiguration with credentials
CWE-668
Ruby
rb/zip-slip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-668
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-668
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-668
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-668
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-668
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-668
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-668
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-668
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-668
Ruby
rb/sensitive-get-query
Sensitive data read from GET request
CWE-668
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-668
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-668
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-668
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-668
Swift
swift/unsafe-unpacking
Arbitrary file write during a zip extraction from a user controlled source
CWE-668
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-668
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-669
GitHub Actions
actions/artifact-poisoning/critical
Artifact poisoning
CWE-669
GitHub Actions
actions/artifact-poisoning/medium
Artifact poisoning
CWE-669
GitHub Actions
actions/unpinned-tag
Unpinned tag for a non-immutable Action in workflow
CWE-669
GitHub Actions
actions/untrusted-checkout/critical
Checkout of untrusted code in a privileged context
CWE-669
GitHub Actions
actions/untrusted-checkout/high
Checkout of untrusted code in trusted context
CWE-669
GitHub Actions
actions/untrusted-checkout/medium
Checkout of untrusted code in trusted context
CWE-669
GitHub Actions
actions/artifact-poisoning/path-traversal
Artifact Poisoning (Path Traversal)
CWE-669
GitHub Actions
actions/unversioned-immutable-action
Unversioned Immutable Action
CWE-669
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-669
C#
cs/web/file-upload
Use of file upload
CWE-669
C#
cs/web/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-669
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-669
C#
cs/insecure-xml-read
XML is read insecurely
CWE-669
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-669
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-669
JavaScript/TypeScript
js/enabling-electron-insecure-content
Enabling Electron allowRunningInsecureContent
CWE-669
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-669
JavaScript/TypeScript
js/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-669
JavaScript/TypeScript
js/xxe
XML external entity expansion
CWE-669
JavaScript/TypeScript
js/insecure-download
Download of sensitive file through insecure connection
CWE-669
JavaScript/TypeScript
js/functionality-from-untrusted-domain
Untrusted domain used in script or other content
CWE-669
JavaScript/TypeScript
js/functionality-from-untrusted-source
Inclusion of functionality from an untrusted source
CWE-669
JavaScript/TypeScript
js/http-to-file-access
Network data written to file
CWE-669
JavaScript/TypeScript
js/xxe-more-sources
XML external entity expansion with additional heuristic sources
CWE-669
Python
py/xxe
XML external entity expansion
CWE-669
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-669
Ruby
rb/xxe
XML external entity expansion
CWE-669
Ruby
rb/insecure-download
Download of sensitive file through insecure connection
CWE-669
Ruby
rb/http-to-file-access
Network data written to file
CWE-669
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-670
C/C++
cpp/comma-before-misleading-indentation
Comma before misleading indentation
CWE-670
C/C++
cpp/assign-where-compare-meant
Assignment where comparison was intended
CWE-670
C/C++
cpp/compare-where-assign-meant
Comparison where assignment was intended
CWE-670
C/C++
cpp/incorrect-not-operator-usage
Incorrect 'not' operator usage
CWE-670
C/C++
cpp/logical-operator-applied-to-flag
Short-circuiting operator applied to flag
CWE-670
C/C++
cpp/unsafe-use-of-this
Unsafe use of this in constructor
CWE-670
C/C++
cpp/dangerous-use-of-ssl-shutdown
Dangerous use SSL_shutdown
CWE-670
C/C++
cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations
Operator Precedence Logic Error When Use Bitwise Or Logical Operations
CWE-670
C/C++
cpp/operator-precedence-logic-error-when-use-bool-type
Operator Precedence Logic Error When Use Bool Type
CWE-670
C#
cs/non-short-circuit
Potentially dangerous use of non-short-circuit logic
CWE-670
Go
go/mistyped-exponentiation
Bitwise exclusive-or used like exponentiation
CWE-670
Go
go/whitespace-contradicts-precedence
Whitespace contradicts operator precedence
CWE-670
Go
go/useless-expression
Expression has no effect
CWE-670
Go
go/redundant-operation
Identical operands
CWE-670
Go
go/redundant-assignment
Self assignment
CWE-670
Java/Kotlin
java/whitespace-contradicts-precedence
Whitespace contradicts operator precedence
CWE-670
Java/Kotlin
java/assignment-in-boolean-expression
Assignment in Boolean expression
CWE-670
Java/Kotlin
java/reference-equality-on-strings
Reference equality test on strings
CWE-670
Java/Kotlin
java/switch-fall-through
Unterminated switch case
CWE-670
JavaScript/TypeScript
js/useless-expression
Expression has no effect
CWE-670
JavaScript/TypeScript
js/redundant-operation
Identical operands
CWE-670
JavaScript/TypeScript
js/redundant-assignment
Self assignment
CWE-670
JavaScript/TypeScript
js/unclear-operator-precedence
Unclear precedence of nested operators
CWE-670
JavaScript/TypeScript
js/whitespace-contradicts-precedence
Whitespace contradicts operator precedence
CWE-670
JavaScript/TypeScript
js/deletion-of-non-property
Deleting non-property
CWE-670
JavaScript/TypeScript
js/misleading-indentation-of-dangling-else
Misleading indentation of dangling 'else'
CWE-670
JavaScript/TypeScript
js/misleading-indentation-after-control-statement
Misleading indentation after control statement
CWE-670
Python
py/asserts-tuple
Asserting a tuple
CWE-671
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-671
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-671
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-671
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-671
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-671
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-671
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-671
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-671
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-671
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-671
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-671
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-671
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-671
Swift
swift/constant-password
Constant password
CWE-671
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-672
C/C++
cpp/double-free
Potential double free
CWE-672
C/C++
cpp/use-after-free
Potential use after free
CWE-672
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-672
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-672
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-672
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-672
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-672
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-672
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-672
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-672
Rust
rust/access-after-lifetime-ended
Access of a pointer after its lifetime has ended
CWE-672
Rust
rust/access-invalid-pointer
Access of invalid pointer
CWE-674
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-674
C#
cs/insecure-xml-read
XML is read insecurely
CWE-674
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-674
JavaScript/TypeScript
js/xml-bomb
XML internal entity expansion
CWE-674
JavaScript/TypeScript
js/xml-bomb-more-sources
XML internal entity expansion with additional heuristic sources
CWE-674
Python
py/xml-bomb
XML internal entity expansion
CWE-674
Python
py/simple-xml-rpc-server-dos
SimpleXMLRPCServer denial of service
CWE-674
Ruby
rb/xxe
XML external entity expansion
CWE-674
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-675
C/C++
cpp/double-free
Potential double free
CWE-675
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-675
C/C++
cpp/twice-locked
Mutex locked twice
CWE-675
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-675
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-675
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-675
C/C++
cpp/double-release
Errors When Double Release
CWE-675
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-676
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-676
C/C++
cpp/suspicious-call-to-memset
Suspicious call to memset
CWE-676
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-676
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-676
C/C++
cpp/dangerous-function-overflow
Use of dangerous function
CWE-676
C/C++
cpp/dangerous-cin
Dangerous use of 'cin'
CWE-676
C/C++
cpp/potentially-dangerous-function
Use of potentially dangerous function
CWE-676
Java/Kotlin
java/potentially-dangerous-function
Use of a potentially dangerous function
CWE-676
JavaScript/TypeScript
js/eval-like-call
Call to eval-like DOM function
CWE-676
JavaScript/TypeScript
js/eval-call
Use of eval
CWE-681
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-681
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-681
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-681
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-681
C#
cs/loss-of-precision
Possible loss of precision
CWE-681
Go
go/shift-out-of-range
Shift out of range
CWE-681
Go
go/incorrect-integer-conversion
Incorrect conversion between integer types
CWE-681
Java/Kotlin
java/implicit-cast-in-compound-assignment
Implicit narrowing conversion in compound assignment
CWE-681
Java/Kotlin
java/integer-multiplication-cast-to-long
Result of multiplication cast to wider type
CWE-681
Java/Kotlin
java/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-681
Java/Kotlin
java/tainted-numeric-cast
User-controlled data in numeric cast
CWE-681
JavaScript/TypeScript
js/shift-out-of-range
Shift out of range
CWE-682
C/C++
cpp/overflow-calculated
Buffer not sufficient for string
CWE-682
C/C++
cpp/overflow-destination
Copy function using source size
CWE-682
C/C++
cpp/static-buffer-overflow
Static array access may cause overflow
CWE-682
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-682
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-682
C/C++
cpp/ambiguously-signed-bit-field
Ambiguously signed bit-field member
CWE-682
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-682
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-682
C/C++
cpp/signed-overflow-check
Signed overflow check
CWE-682
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-682
C/C++
cpp/suspicious-sizeof
Suspicious 'sizeof' use
CWE-682
C/C++
cpp/overrun-write
Overrunning write
CWE-682
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-682
C/C++
cpp/tainted-arithmetic
User-controlled data in arithmetic expression
CWE-682
C/C++
cpp/uncontrolled-arithmetic
Uncontrolled data in arithmetic expression
CWE-682
C/C++
cpp/arithmetic-with-extreme-values
Use of extreme values in arithmetic expression
CWE-682
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-682
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-682
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-682
C/C++
cpp/unsigned-difference-expression-compared-zero
Unsigned difference expression compared to zero
CWE-682
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-682
C/C++
cpp/suspicious-pointer-scaling
Suspicious pointer scaling
CWE-682
C/C++
cpp/incorrect-pointer-scaling-char
Suspicious pointer scaling to char
CWE-682
C/C++
cpp/suspicious-pointer-scaling-void
Suspicious pointer scaling to void
CWE-682
C/C++
cpp/suspicious-add-sizeof
Suspicious add with sizeof
CWE-682
C/C++
cpp/multiplication-overflow-in-alloc
Multiplication result may overflow and be used in allocation
CWE-682
C/C++
cpp/dangerous-use-of-transformation-after-operation
Dangerous use of transformation after operation
CWE-682
C/C++
cpp/divide-by-zero-using-return-value
Divide by zero using return value
CWE-682
C/C++
cpp/signed-bit-field
Possible signed bit-field member
CWE-682
C#
cs/index-out-of-bounds
Off-by-one comparison against container length
CWE-682
C#
cs/loss-of-precision
Possible loss of precision
CWE-682
Go
go/index-out-of-bounds
Off-by-one comparison against length
CWE-682
Go
go/allocation-size-overflow
Size computation for allocation may overflow
CWE-682
Go
go/incorrect-integer-conversion
Incorrect conversion between integer types
CWE-682
Go
go/divide-by-zero
Divide by zero
CWE-682
Java/Kotlin
java/implicit-cast-in-compound-assignment
Implicit narrowing conversion in compound assignment
CWE-682
Java/Kotlin
java/integer-multiplication-cast-to-long
Result of multiplication cast to wider type
CWE-682
Java/Kotlin
java/index-out-of-bounds
Array index out of bounds
CWE-682
Java/Kotlin
java/tainted-arithmetic
User-controlled data in arithmetic expression
CWE-682
Java/Kotlin
java/uncontrolled-arithmetic
Uncontrolled data in arithmetic expression
CWE-682
Java/Kotlin
java/extreme-value-arithmetic
Use of extreme values in arithmetic expression
CWE-682
Java/Kotlin
java/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-682
JavaScript/TypeScript
js/index-out-of-bounds
Off-by-one comparison against length
CWE-682
Swift
swift/string-length-conflation
String length conflation
CWE-684
C#
cs/web/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-684
JavaScript/TypeScript
js/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-685
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-685
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-685
Java/Kotlin
java/missing-format-argument
Missing format argument
CWE-685
Java/Kotlin
java/unused-format-argument
Unused format argument
CWE-685
JavaScript/TypeScript
js/superfluous-trailing-arguments
Superfluous trailing arguments
CWE-685
Python
py/call/wrong-number-class-arguments
Wrong number of arguments in a class instantiation
CWE-685
Python
py/percent-format/wrong-arguments
Wrong number of arguments for format
CWE-685
Python
py/call/wrong-arguments
Wrong number of arguments in a call
CWE-686
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-687
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-687
Python
py/super-not-enclosing-class
First argument to super() is not enclosing class
CWE-691
GitHub Actions
actions/code-injection/critical
Code injection
CWE-691
GitHub Actions
actions/code-injection/medium
Code injection
CWE-691
GitHub Actions
actions/cache-poisoning/code-injection
Cache Poisoning via low-privileged code injection
CWE-691
GitHub Actions
actions/untrusted-checkout-toctou/critical
Untrusted Checkout TOCTOU
CWE-691
GitHub Actions
actions/untrusted-checkout-toctou/high
Untrusted Checkout TOCTOU
CWE-691
C/C++
cpp/comma-before-misleading-indentation
Comma before misleading indentation
CWE-691
C/C++
cpp/assign-where-compare-meant
Assignment where comparison was intended
CWE-691
C/C++
cpp/compare-where-assign-meant
Comparison where assignment was intended
CWE-691
C/C++
cpp/incorrect-not-operator-usage
Incorrect 'not' operator usage
CWE-691
C/C++
cpp/logical-operator-applied-to-flag
Short-circuiting operator applied to flag
CWE-691
C/C++
cpp/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-691
C/C++
cpp/unsafe-use-of-this
Unsafe use of this in constructor
CWE-691
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-691
C/C++
cpp/toctou-race-condition
Time-of-check time-of-use filesystem race condition
CWE-691
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-691
C/C++
cpp/twice-locked
Mutex locked twice
CWE-691
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-691
C/C++
cpp/infinite-loop-with-unsatisfiable-exit-condition
Infinite loop with unsatisfiable exit condition
CWE-691
C/C++
cpp/linux-kernel-double-fetch-vulnerability
Linux kernel double-fetch vulnerability detection
CWE-691
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-691
C/C++
cpp/dangerous-use-of-ssl-shutdown
Dangerous use SSL_shutdown
CWE-691
C/C++
cpp/errors-after-refactoring
Errors After Refactoring
CWE-691
C/C++
cpp/errors-when-using-bit-operations
Errors When Using Bit Operations
CWE-691
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-691
C/C++
cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations
Operator Precedence Logic Error When Use Bitwise Or Logical Operations
CWE-691
C/C++
cpp/operator-precedence-logic-error-when-use-bool-type
Operator Precedence Logic Error When Use Bool Type
CWE-691
C#
cs/catch-nullreferenceexception
Poor error handling: catch of NullReferenceException
CWE-691
C#
cs/constant-condition
Constant condition
CWE-691
C#
cs/unsafe-sync-on-field
Futile synchronization on field
CWE-691
C#
cs/inconsistent-lock-sequence
Inconsistent lock sequence
CWE-691
C#
cs/lock-this
Locking the 'this' object in a lock statement
CWE-691
C#
cs/locked-wait
A lock is held during a wait
CWE-691
C#
cs/unsynchronized-getter
Inconsistently synchronized property
CWE-691
C#
cs/unsafe-double-checked-lock
Double-checked lock is not thread-safe
CWE-691
C#
cs/unsynchronized-static-access
Unsynchronized access to static collection member in non-static context
CWE-691
C#
cs/catch-of-all-exceptions
Generic catch clause
CWE-691
C#
cs/non-short-circuit
Potentially dangerous use of non-short-circuit logic
CWE-691
C#
cs/thread-unsafe-icryptotransform-field-in-class
Thread-unsafe use of a static ICryptoTransform field
CWE-691
C#
cs/thread-unsafe-icryptotransform-captured-in-lambda
Thread-unsafe capturing of an ICryptoTransform object
CWE-691
C#
cs/linq/inconsistent-enumeration
Bad multiple iteration
CWE-691
C#
cs/code-injection
Improper control of generation of code
CWE-691
C#
cs/web/missing-global-error-handler
Missing global error handler
CWE-691
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-691
C#
cs/insecure-xml-read
XML is read insecurely
CWE-691
Go
go/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-691
Go
go/mistyped-exponentiation
Bitwise exclusive-or used like exponentiation
CWE-691
Go
go/whitespace-contradicts-precedence
Whitespace contradicts operator precedence
CWE-691
Go
go/useless-expression
Expression has no effect
CWE-691
Go
go/redundant-operation
Identical operands
CWE-691
Go
go/redundant-recover
Redundant call to recover
CWE-691
Go
go/redundant-assignment
Self assignment
CWE-691
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-691
Java/Kotlin
java/ejb/container-interference
EJB interferes with container operation
CWE-691
Java/Kotlin
java/ejb/synchronization
EJB uses synchronization
CWE-691
Java/Kotlin
java/whitespace-contradicts-precedence
Whitespace contradicts operator precedence
CWE-691
Java/Kotlin
java/assignment-in-boolean-expression
Assignment in Boolean expression
CWE-691
Java/Kotlin
java/reference-equality-on-strings
Reference equality test on strings
CWE-691
Java/Kotlin
java/wait-on-condition-interface
Wait on condition
CWE-691
Java/Kotlin
java/call-to-thread-run
Direct call to a run() method
CWE-691
Java/Kotlin
java/unsafe-double-checked-locking
Double-checked locking is not thread-safe
CWE-691
Java/Kotlin
java/unsafe-double-checked-locking-init-order
Race condition in double-checked locking object initialization
CWE-691
Java/Kotlin
java/unsafe-sync-on-field
Futile synchronization on field
CWE-691
Java/Kotlin
java/inconsistent-field-synchronization
Inconsistent synchronization for field
CWE-691
Java/Kotlin
java/lazy-initialization
Incorrect lazy initialization of a static field
CWE-691
Java/Kotlin
java/non-sync-override
Non-synchronized override of synchronized method
CWE-691
Java/Kotlin
java/notify-instead-of-notify-all
notify instead of notifyAll
CWE-691
Java/Kotlin
java/sleep-with-lock-held
Sleep with lock held
CWE-691
Java/Kotlin
java/sync-on-boxed-types
Synchronization on boxed types or strings
CWE-691
Java/Kotlin
java/unsynchronized-getter
Inconsistent synchronization of getter and setter
CWE-691
Java/Kotlin
java/inconsistent-sync-writeobject
Inconsistent synchronization for writeObject()
CWE-691
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-691
Java/Kotlin
java/wait-with-two-locks
Wait with two locks held
CWE-691
Java/Kotlin
java/non-short-circuit-evaluation
Dangerous non-short-circuit logic
CWE-691
Java/Kotlin
java/constant-loop-condition
Constant loop condition
CWE-691
Java/Kotlin
java/android/arbitrary-apk-installation
Android APK installation
CWE-691
Java/Kotlin
java/groovy-injection
Groovy Language injection
CWE-691
Java/Kotlin
java/insecure-bean-validation
Insecure Bean Validation
CWE-691
Java/Kotlin
java/jexl-expression-injection
Expression language injection (JEXL)
CWE-691
Java/Kotlin
java/mvel-expression-injection
Expression language injection (MVEL)
CWE-691
Java/Kotlin
java/spel-expression-injection
Expression language injection (Spring)
CWE-691
Java/Kotlin
java/server-side-template-injection
Server-side template injection
CWE-691
Java/Kotlin
java/toctou-race-condition
Time-of-check time-of-use race condition
CWE-691
Java/Kotlin
java/socket-auth-race-condition
Race condition in socket authentication
CWE-691
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-691
Java/Kotlin
java/android/unsafe-android-webview-fetch
Unsafe resource fetching in Android WebView
CWE-691
Java/Kotlin
java/lock-order-inconsistency
Lock order inconsistency
CWE-691
Java/Kotlin
java/unreachable-exit-in-loop
Loop with unreachable exit condition
CWE-691
Java/Kotlin
java/switch-fall-through
Unterminated switch case
CWE-691
Java/Kotlin
java/overly-general-catch
Overly-general catch clause
CWE-691
Java/Kotlin
java/uncaught-number-format-exception
Missing catch of NumberFormatException
CWE-691
Java/Kotlin
java/jvm-exit
Forcible JVM termination
CWE-691
Java/Kotlin
java/abnormal-finally-completion
Finally block may not complete normally
CWE-691
Java/Kotlin
java/beanshell-injection
BeanShell injection
CWE-691
Java/Kotlin
java/android-insecure-dex-loading
Insecure loading of an Android Dex File
CWE-691
Java/Kotlin
java/jshell-injection
JShell injection
CWE-691
Java/Kotlin
java/javaee-expression-injection
Jakarta Expression Language injection
CWE-691
Java/Kotlin
java/jython-injection
Injection in Jython
CWE-691
Java/Kotlin
java/unsafe-eval
Injection in Java Script Engine
CWE-691
Java/Kotlin
java/spring-view-manipulation-implicit
Spring Implicit View Manipulation
CWE-691
Java/Kotlin
java/spring-view-manipulation
Spring View Manipulation
CWE-691
Java/Kotlin
java/uncaught-servlet-exception
Uncaught Servlet Exception
CWE-691
JavaScript/TypeScript
js/enabling-electron-renderer-node-integration
Enabling Node.js integration for Electron web content renderers
CWE-691
JavaScript/TypeScript
js/useless-expression
Expression has no effect
CWE-691
JavaScript/TypeScript
js/redundant-operation
Identical operands
CWE-691
JavaScript/TypeScript
js/redundant-assignment
Self assignment
CWE-691
JavaScript/TypeScript
js/unclear-operator-precedence
Unclear precedence of nested operators
CWE-691
JavaScript/TypeScript
js/whitespace-contradicts-precedence
Whitespace contradicts operator precedence
CWE-691
JavaScript/TypeScript
js/deletion-of-non-property
Deleting non-property
CWE-691
JavaScript/TypeScript
js/exit-from-finally
Jump from finally
CWE-691
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-691
JavaScript/TypeScript
js/code-injection
Code injection
CWE-691
JavaScript/TypeScript
js/bad-code-sanitization
Improper code sanitization
CWE-691
JavaScript/TypeScript
js/unsafe-code-construction
Unsafe code constructed from library input
CWE-691
JavaScript/TypeScript
js/unsafe-dynamic-method-access
Unsafe dynamic method access
CWE-691
JavaScript/TypeScript
js/file-system-race
Potential file system race condition
CWE-691
JavaScript/TypeScript
js/server-crash
Server crash
CWE-691
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-691
JavaScript/TypeScript
js/xml-bomb
XML internal entity expansion
CWE-691
JavaScript/TypeScript
js/loop-bound-injection
Loop bound injection
CWE-691
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-691
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-691
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-691
JavaScript/TypeScript
js/misleading-indentation-of-dangling-else
Misleading indentation of dangling 'else'
CWE-691
JavaScript/TypeScript
js/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-691
JavaScript/TypeScript
js/misleading-indentation-after-control-statement
Misleading indentation after control statement
CWE-691
JavaScript/TypeScript
js/code-injection-dynamic-import
Code injection from dynamically imported code
CWE-691
JavaScript/TypeScript
js/code-injection-more-sources
Code injection with additional heuristic sources
CWE-691
JavaScript/TypeScript
js/xml-bomb-more-sources
XML internal entity expansion with additional heuristic sources
CWE-691
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-691
Python
py/catch-base-exception
Except block handles 'BaseException'
CWE-691
Python
py/use-of-input
'input' function used in Python 2
CWE-691
Python
py/code-injection
Code injection
CWE-691
Python
py/xml-bomb
XML internal entity expansion
CWE-691
Python
py/asserts-tuple
Asserting a tuple
CWE-691
Python
py/exit-from-finally
'break' or 'return' statement in finally
CWE-691
Python
py/js2py-rce
JavaScript code execution
CWE-691
Python
py/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-691
Python
py/simple-xml-rpc-server-dos
SimpleXMLRPCServer denial of service
CWE-691
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-691
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-691
Ruby
rb/code-injection
Code injection
CWE-691
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-691
Ruby
rb/xxe
XML external entity expansion
CWE-691
Rust
rust/ctor-initialization
Bad 'ctor' initialization
CWE-691
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-691
Swift
swift/unsafe-js-eval
JavaScript Injection
CWE-691
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-693
GitHub Actions
actions/composite-action-sinks
Composite Action Sinks
CWE-693
GitHub Actions
actions/composite-action-sources
Composite Action Sources
CWE-693
GitHub Actions
actions/composite-action-summaries
Composite Action Summaries
CWE-693
GitHub Actions
actions/reusable-workflow-sinks
Reusable Workflow Sinks
CWE-693
GitHub Actions
actions/reusable-workflow-sources
Reusable Workflow Sources
CWE-693
GitHub Actions
actions/reusable-workflow-summaries
Reusable Workflows Summaries
CWE-693
GitHub Actions
actions/envpath-injection/critical
PATH environment variable built from user-controlled sources
CWE-693
GitHub Actions
actions/envpath-injection/medium
PATH environment variable built from user-controlled sources
CWE-693
GitHub Actions
actions/envvar-injection/critical
Environment variable built from user-controlled sources
CWE-693
GitHub Actions
actions/envvar-injection/medium
Environment variable built from user-controlled sources
CWE-693
GitHub Actions
actions/improper-access-control
Improper Access Control
CWE-693
GitHub Actions
actions/excessive-secrets-exposure
Excessive Secrets Exposure
CWE-693
GitHub Actions
actions/secrets-in-artifacts
Storage of sensitive information in GitHub Actions artifact
CWE-693
GitHub Actions
actions/unmasked-secret-exposure
Unmasked Secret Exposure
CWE-693
GitHub Actions
actions/cache-poisoning/code-injection
Cache Poisoning via low-privileged code injection
CWE-693
GitHub Actions
actions/cache-poisoning/direct-cache
Cache Poisoning via caching of untrusted files
CWE-693
GitHub Actions
actions/cache-poisoning/poisonable-step
Cache Poisoning via execution of untrusted code
CWE-693
GitHub Actions
actions/pr-on-self-hosted-runner
Pull Request code execution on self-hosted runner
CWE-693
C/C++
cpp/boost/tls-settings-misconfiguration
boost::asio TLS settings misconfiguration
CWE-693
C/C++
cpp/boost/use-of-deprecated-hardcoded-security-protocol
boost::asio use of deprecated hardcoded protocol
CWE-693
C/C++
cpp/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-693
C/C++
cpp/count-untrusted-data-external-api-ir
Frequency counts for external APIs that are used with untrusted data
CWE-693
C/C++
cpp/untrusted-data-to-external-api-ir
Untrusted data passed to external API
CWE-693
C/C++
cpp/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-693
C/C++
cpp/uncontrolled-process-operation
Uncontrolled process operation
CWE-693
C/C++
cpp/unclear-array-index-validation
Unclear validation of array index
CWE-693
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-693
C/C++
cpp/user-controlled-bypass
Authentication bypass by spoofing
CWE-693
C/C++
cpp/certificate-result-conflation
Certificate result conflation
CWE-693
C/C++
cpp/certificate-not-checked
Certificate not checked
CWE-693
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-693
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-693
C/C++
cpp/cleartext-transmission
Cleartext transmission of sensitive information
CWE-693
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-693
C/C++
cpp/non-https-url
Failure to use HTTPS URLs
CWE-693
C/C++
cpp/insufficient-key-size
Use of a cryptographic algorithm with insufficient key size
CWE-693
C/C++
cpp/weak-cryptographic-algorithm
Use of a broken or risky cryptographic algorithm
CWE-693
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-693
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-693
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-693
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-693
C/C++
cpp/tainted-permissions-check
Untrusted input for a condition
CWE-693
C/C++
cpp/late-check-of-function-argument
Late Check Of Function Argument
CWE-693
C/C++
cpp/linux-kernel-no-check-before-unsafe-put-user
Linux kernel no check before unsafe_put_user vulnerability detection
CWE-693
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-693
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-693
C/C++
cpp/pam-auth-bypass
PAM Authorization bypass
CWE-693
C/C++
cpp/curl-disabled-ssl
Disabled certifcate verification
CWE-693
C/C++
cpp/unknown-asymmetric-key-gen-size
Unknown key generation key size
CWE-693
C/C++
cpp/weak-asymmetric-key-gen-size
Weak asymmetric key generation key size (< 2048 bits)
CWE-693
C/C++
cpp/weak-block-mode
Weak block mode
CWE-693
C/C++
cpp/weak-elliptic-curve
Weak elliptic curve
CWE-693
C/C++
cpp/weak-crypto/banned-encryption-algorithms
Weak cryptography
CWE-693
C/C++
cpp/weak-crypto/banned-hash-algorithms
Weak cryptography
CWE-693
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-693
C#
cs/password-in-configuration
Password in configuration file
CWE-693
C#
cs/web/ambiguous-client-variable
Value shadowing
CWE-693
C#
cs/web/ambiguous-server-variable
Value shadowing: server variable
CWE-693
C#
cs/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-693
C#
cs/serialization-check-bypass
Serialization check bypass
CWE-693
C#
cs/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-693
C#
cs/xml/missing-validation
Missing XML validation
CWE-693
C#
cs/assembly-path-injection
Assembly path injection
CWE-693
C#
cs/web/missing-function-level-access-control
Missing function level access control
CWE-693
C#
cs/cleartext-storage-of-sensitive-information
Clear text storage of sensitive information
CWE-693
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-693
C#
cs/adding-cert-to-root-store
Do not add certificates to the system root store
CWE-693
C#
cs/insecure-sql-connection
Insecure SQL connection
CWE-693
C#
cs/web/missing-token-validation
Missing cross-site request forgery token validation
CWE-693
C#
cs/session-reuse
Failure to abandon session
CWE-693
C#
cs/web/cookie-secure-not-set
Cookie 'Secure' attribute is not set to true
CWE-693
C#
cs/web/requiressl-not-set
'requireSSL' attribute is not set to true
CWE-693
C#
cs/web/insecure-direct-object-reference
Insecure Direct Object Reference
CWE-693
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-693
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-693
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-693
C#
cs/web/broad-cookie-domain
Cookie security: overly broad domain
CWE-693
C#
cs/web/broad-cookie-path
Cookie security: overly broad path
CWE-693
C#
cs/ecb-encryption
Encryption using ECB
CWE-693
C#
cs/inadequate-rsa-padding
Weak encryption: inadequate RSA padding
CWE-693
C#
cs/insufficient-key-size
Weak encryption: Insufficient key size
CWE-693
C#
cs/weak-encryption
Weak encryption
CWE-693
C#
cs/azure-storage/unsafe-usage-of-client-side-encryption-version
Unsafe usage of v1 version of Azure Storage client-side encryption (CVE-2022-30187)
CWE-693
C#
cs/hash-without-salt
Use of a hash function without a salt
CWE-693
Go
go/constant-length-comparison
Constant length comparison
CWE-693
Go
go/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-693
Go
go/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-693
Go
go/incomplete-url-scheme-check
Incomplete URL scheme check
CWE-693
Go
go/regex/missing-regexp-anchor
Missing regular expression anchor
CWE-693
Go
go/suspicious-character-in-regex
Suspicious characters in a regular expression
CWE-693
Go
go/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-693
Go
go/untrusted-data-to-unknown-external-api
Untrusted data passed to unknown external API
CWE-693
Go
go/disabled-certificate-check
Disabled TLS certificate check
CWE-693
Go
go/clear-text-logging
Clear-text logging of sensitive information
CWE-693
Go
go/insecure-hostkeycallback
Use of insecure HostKeyCallback implementation
CWE-693
Go
go/weak-crypto-key
Use of a weak cryptographic key
CWE-693
Go
go/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-693
Go
go/insecure-tls
Insecure TLS configuration
CWE-693
Go
go/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-693
Go
go/missing-jwt-signature-check
Missing JWT signature check
CWE-693
Go
go/constant-oauth2-state
Use of constant state value in OAuth 2.0 URL
CWE-693
Go
go/cookie-secure-not-set
Cookie 'Secure' attribute is not set to true
CWE-693
Go
go/email-injection
Email content injection
CWE-693
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-693
Go
go/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-693
Go
go/improper-ldap-auth
Improper LDAP Authentication
CWE-693
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-693
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-693
Go
go/cors-misconfiguration
CORS misconfiguration
CWE-693
Java/Kotlin
java/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-693
Java/Kotlin
java/overly-large-range
Overly permissive regular expression range
CWE-693
Java/Kotlin
java/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-693
Java/Kotlin
java/improper-validation-of-array-construction
Improper validation of user-provided size used for array construction
CWE-693
Java/Kotlin
java/improper-validation-of-array-construction-code-specified
Improper validation of code-specified size used for array construction
CWE-693
Java/Kotlin
java/improper-validation-of-array-index
Improper validation of user-provided array index
CWE-693
Java/Kotlin
java/improper-validation-of-array-index-code-specified
Improper validation of code-specified array index
CWE-693
Java/Kotlin
java/local-temp-file-or-directory-information-disclosure
Local information disclosure in a temporary directory
CWE-693
Java/Kotlin
java/android/intent-uri-permission-manipulation
Intent URI permission manipulation
CWE-693
Java/Kotlin
java/unsafe-cert-trust
Unsafe certificate trust
CWE-693
Java/Kotlin
java/android/insecure-local-key-gen
Insecurely generated keys for local authentication
CWE-693
Java/Kotlin
java/android/insecure-local-authentication
Insecure local authentication
CWE-693
Java/Kotlin
java/android/missing-certificate-pinning
Android missing certificate pinning
CWE-693
Java/Kotlin
java/improper-webview-certificate-validation
Android WebView that accepts all certificates
CWE-693
Java/Kotlin
java/insecure-trustmanager
TrustManager that accepts all certificates
CWE-693
Java/Kotlin
java/insecure-smtp-ssl
Insecure JavaMail SSL Configuration
CWE-693
Java/Kotlin
java/unsafe-hostname-verification
Unsafe hostname verification
CWE-693
Java/Kotlin
java/android/backup-enabled
Application backup allowed
CWE-693
Java/Kotlin
java/android/cleartext-storage-database
Cleartext storage of sensitive information using a local database on Android
CWE-693
Java/Kotlin
java/android/cleartext-storage-filesystem
Cleartext storage of sensitive information in the Android filesystem
CWE-693
Java/Kotlin
java/cleartext-storage-in-class
Cleartext storage of sensitive information using storable class
CWE-693
Java/Kotlin
java/cleartext-storage-in-cookie
Cleartext storage of sensitive information in cookie
CWE-693
Java/Kotlin
java/cleartext-storage-in-properties
Cleartext storage of sensitive information using 'Properties' class
CWE-693
Java/Kotlin
java/android/cleartext-storage-shared-prefs
Cleartext storage of sensitive information using SharedPreferences on Android
CWE-693
Java/Kotlin
java/non-https-url
Failure to use HTTPS URLs
CWE-693
Java/Kotlin
java/non-ssl-connection
Failure to use SSL
CWE-693
Java/Kotlin
java/non-ssl-socket-factory
Failure to use SSL socket factories
CWE-693
Java/Kotlin
java/insufficient-key-size
Use of a cryptographic algorithm with insufficient key size
CWE-693
Java/Kotlin
java/weak-cryptographic-algorithm
Use of a broken or risky cryptographic algorithm
CWE-693
Java/Kotlin
java/potentially-weak-cryptographic-algorithm
Use of a potentially broken or risky cryptographic algorithm
CWE-693
Java/Kotlin
java/missing-jwt-signature-check
Missing JWT signature check
CWE-693
Java/Kotlin
java/csrf-unprotected-request-type
HTTP request type unprotected from CSRF
CWE-693
Java/Kotlin
java/spring-disabled-csrf-protection
Disabled Spring CSRF protection
CWE-693
Java/Kotlin
java/socket-auth-race-condition
Race condition in socket authentication
CWE-693
Java/Kotlin
java/insecure-basic-auth
Insecure basic authentication
CWE-693
Java/Kotlin
java/insecure-ldap-auth
Insecure LDAP authentication
CWE-693
Java/Kotlin
java/insecure-cookie
Failure to use secure cookies
CWE-693
Java/Kotlin
java/world-writable-file-read
Reading from a world writable file
CWE-693
Java/Kotlin
java/rsa-without-oaep
Use of RSA algorithm without OAEP
CWE-693
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-693
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-693
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-693
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-693
Java/Kotlin
java/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-693
Java/Kotlin
java/tainted-permissions-check
User-controlled data used in permissions check
CWE-693
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-693
Java/Kotlin
java/improper-intent-verification
Improper verification of intent by broadcast receiver
CWE-693
Java/Kotlin
java/android/incomplete-provider-permissions
Missing read or write permission in a content provider
CWE-693
Java/Kotlin
java/android/implicitly-exported-component
Implicitly exported Android component
CWE-693
Java/Kotlin
java/android/implicit-pendingintents
Use of implicit PendingIntents
CWE-693
Java/Kotlin
java/android/sensitive-communication
Leaking sensitive information through an implicit Intent
CWE-693
Java/Kotlin
java/android/sensitive-result-receiver
Leaking sensitive information through a ResultReceiver
CWE-693
Java/Kotlin
java/android/intent-redirection
Android Intent redirection
CWE-693
Java/Kotlin
java/log4j-injection
Potential Log4J LDAP JNDI injection (CVE-2021-44228)
CWE-693
Java/Kotlin
java/jxbrowser/disabled-certificate-validation
JxBrowser with disabled certificate validation
CWE-693
Java/Kotlin
java/ignored-hostname-verification
Ignored result of hostname verification
CWE-693
Java/Kotlin
java/insecure-ldaps-endpoint
Insecure LDAPS Endpoint Configuration
CWE-693
Java/Kotlin
java/disabled-certificate-revocation-checking
Disabled certificate revocation checking
CWE-693
Java/Kotlin
java/azure-storage/unsafe-client-side-encryption-in-use
Unsafe usage of v1 version of Azure Storage client-side encryption (CVE-2022-30187)
CWE-693
Java/Kotlin
java/unsafe-tls-version
Unsafe TLS version
CWE-693
Java/Kotlin
java/unvalidated-cors-origin-set
CORS is derived from untrusted input
CWE-693
Java/Kotlin
java/missing-jwt-signature-check-auth0
Missing JWT signature check
CWE-693
Java/Kotlin
java/ip-address-spoofing
IP address spoofing
CWE-693
Java/Kotlin
java/jsonp-injection
JSONP Injection
CWE-693
Java/Kotlin
java/credentials-in-properties
Cleartext Credentials in Properties File
CWE-693
Java/Kotlin
java/password-in-configuration
Password in configuration file
CWE-693
Java/Kotlin
java/permissive-dot-regex
URL matched by permissive . in a regular expression
CWE-693
Java/Kotlin
java/hash-without-salt
Use of a hash function without a salt
CWE-693
Java/Kotlin
java/incorrect-url-verification
Incorrect URL verification
CWE-693
Java/Kotlin
java/weak-cryptographic-algorithm-new-model
Use of a broken or risky cryptographic algorithm
CWE-693
Java/Kotlin
java/quantum/examples/weak-hash
Weak hashes
CWE-693
Java/Kotlin
java/quantum/examples/weak-ciphers
Weak symmetric ciphers
CWE-693
JavaScript/TypeScript
js/angular/insecure-url-whitelist
Insecure URL whitelist
CWE-693
JavaScript/TypeScript
js/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-693
JavaScript/TypeScript
js/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-693
JavaScript/TypeScript
js/incomplete-url-scheme-check
Incomplete URL scheme check
CWE-693
JavaScript/TypeScript
js/incomplete-url-substring-sanitization
Incomplete URL substring sanitization
CWE-693
JavaScript/TypeScript
js/incorrect-suffix-check
Incorrect suffix check
CWE-693
JavaScript/TypeScript
js/missing-origin-check
Missing origin verification in postMessage handler
CWE-693
JavaScript/TypeScript
js/regex/missing-regexp-anchor
Missing regular expression anchor
CWE-693
JavaScript/TypeScript
js/overly-large-range
Overly permissive regular expression range
CWE-693
JavaScript/TypeScript
js/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-693
JavaScript/TypeScript
js/useless-regexp-character-escape
Useless regular-expression character escape
CWE-693
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-693
JavaScript/TypeScript
js/double-escaping
Double escaping or unescaping
CWE-693
JavaScript/TypeScript
js/incomplete-html-attribute-sanitization
Incomplete HTML attribute sanitization
CWE-693
JavaScript/TypeScript
js/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-693
JavaScript/TypeScript
js/incomplete-sanitization
Incomplete string escaping or encoding
CWE-693
JavaScript/TypeScript
js/exposure-of-private-files
Exposure of private files
CWE-693
JavaScript/TypeScript
js/disabling-certificate-validation
Disabling certificate validation
CWE-693
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-693
JavaScript/TypeScript
js/build-artifact-leak
Storage of sensitive information in build artifact
CWE-693
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-693
JavaScript/TypeScript
js/clear-text-storage-of-sensitive-data
Clear text storage of sensitive information
CWE-693
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-693
JavaScript/TypeScript
js/insufficient-key-size
Use of a weak cryptographic key
CWE-693
JavaScript/TypeScript
js/biased-cryptographic-random
Creating biased random numbers from a cryptographically secure source
CWE-693
JavaScript/TypeScript
js/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-693
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-693
JavaScript/TypeScript
js/jwt-missing-verification
JWT missing secret or public key verification
CWE-693
JavaScript/TypeScript
js/missing-token-validation
Missing CSRF middleware
CWE-693
JavaScript/TypeScript
js/session-fixation
Failure to abandon session
CWE-693
JavaScript/TypeScript
js/remote-property-injection
Remote property injection
CWE-693
JavaScript/TypeScript
js/clear-text-cookie
Clear text transmission of sensitive cookie
CWE-693
JavaScript/TypeScript
js/host-header-forgery-in-email-generation
Host header poisoning in email generation
CWE-693
JavaScript/TypeScript
js/insecure-helmet-configuration
Insecure configuration of Helmet security middleware
CWE-693
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-693
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-693
JavaScript/TypeScript
js/user-controlled-bypass
User-controlled bypass of security check
CWE-693
JavaScript/TypeScript
js/different-kinds-comparison-bypass
Comparison of user-controlled data of different kinds
CWE-693
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-693
JavaScript/TypeScript
js/insufficient-password-hash
Use of password hash with insufficient computational effort
CWE-693
JavaScript/TypeScript
js/cors-permissive-configuration
Permissive CORS configuration
CWE-693
JavaScript/TypeScript
js/decode-jwt-without-verification
JWT missing secret or public key verification
CWE-693
JavaScript/TypeScript
js/decode-jwt-without-verification-local-source
JWT missing secret or public key verification
CWE-693
JavaScript/TypeScript
js/user-controlled-data-decompression
User-controlled file decompression
CWE-693
JavaScript/TypeScript
js/untrusted-data-to-external-api-more-sources
Untrusted data passed to external API with additional heuristic sources
CWE-693
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-693
JavaScript/TypeScript
js/remote-property-injection-more-sources
Remote property injection with additional heuristic sources
CWE-693
JavaScript/TypeScript
js/user-controlled-bypass-more-sources
User-controlled bypass of security check with additional heuristic sources
CWE-693
Python
py/count-untrusted-data-external-api
Frequency counts for external APIs that are used with untrusted data
CWE-693
Python
py/untrusted-data-to-external-api
Untrusted data passed to external API
CWE-693
Python
py/cookie-injection
Construction of a cookie using user-supplied input
CWE-693
Python
py/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-693
Python
py/incomplete-url-substring-sanitization
Incomplete URL substring sanitization
CWE-693
Python
py/overly-large-range
Overly permissive regular expression range
CWE-693
Python
py/bad-tag-filter
Bad HTML filtering regexp
CWE-693
Python
py/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-693
Python
py/paramiko-missing-host-key-validation
Accepting unknown SSH host keys when using Paramiko
CWE-693
Python
py/request-without-cert-validation
Request without certificate validation
CWE-693
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-693
Python
py/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-693
Python
py/weak-crypto-key
Use of weak cryptographic key
CWE-693
Python
py/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-693
Python
py/insecure-default-protocol
Default version of SSL/TLS may be insecure
CWE-693
Python
py/insecure-protocol
Use of insecure SSL/TLS version
CWE-693
Python
py/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-693
Python
py/csrf-protection-disabled
CSRF protection weakened or disabled
CWE-693
Python
py/insecure-cookie
Failure to use secure cookies
CWE-693
Python
py/overly-permissive-file
Overly permissive file permissions
CWE-693
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-693
Python
py/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-693
Python
py/flask-constant-secret-key
Initializing SECRET_KEY of Flask application with Constant value
CWE-693
Python
py/improper-ldap-auth
Improper LDAP Authentication
CWE-693
Python
py/azure-storage/unsafe-client-side-encryption-in-use
Unsafe usage of v1 version of Azure Storage client-side encryption
CWE-693
Python
py/jwt-missing-verification
JWT missing secret or public key verification
CWE-693
Python
py/ip-address-spoofing
IP address spoofing
CWE-693
Python
py/insecure-ldap-auth
Python Insecure LDAP Authentication
CWE-693
Python
py/cors-misconfiguration-with-credentials
Cors misconfiguration with credentials
CWE-693
Python
py/unknown-asymmetric-key-gen-size
Unknown key generation key size
CWE-693
Python
py/weak-asymmetric-key-gen-size
Weak key generation key size (< 2048 bits)
CWE-693
Python
py/weak-block-mode
Weak block mode
CWE-693
Python
py/weak-elliptic-curve
Weak elliptic curve
CWE-693
Python
py/weak-hashes
Weak hashes
CWE-693
Python
py/weak-symmetric-encryption
Weak symmetric encryption algorithm
CWE-693
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-693
Ruby
rb/jwt-missing-verification
JWT missing secret or public key verification
CWE-693
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-693
Ruby
rb/improper-ldap-auth
Improper LDAP Authentication
CWE-693
Ruby
rb/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-693
Ruby
rb/incomplete-url-substring-sanitization
Incomplete URL substring sanitization
CWE-693
Ruby
rb/regex/badly-anchored-regexp
Badly anchored regular expression
CWE-693
Ruby
rb/regex/missing-regexp-anchor
Missing regular expression anchor
CWE-693
Ruby
rb/overly-large-range
Overly permissive regular expression range
CWE-693
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-693
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-693
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-693
Ruby
rb/request-without-cert-validation
Request without certificate validation
CWE-693
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-693
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-693
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-693
Ruby
rb/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-693
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-693
Ruby
rb/csrf-protection-disabled
CSRF protection weakened or disabled
CWE-693
Ruby
rb/csrf-protection-not-enabled
CSRF protection not enabled
CWE-693
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-693
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-693
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-693
Rust
rust/regex-injection
Regular expression injection
CWE-693
Rust
rust/disabled-certificate-check
Disabled TLS certificate check
CWE-693
Rust
rust/cleartext-transmission
Cleartext transmission of sensitive information
CWE-693
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-693
Rust
rust/cleartext-storage-database
Cleartext storage of sensitive information in a database
CWE-693
Rust
rust/non-https-url
Failure to use HTTPS URLs
CWE-693
Rust
rust/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-693
Rust
rust/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-693
Rust
rust/insecure-cookie
'Secure' attribute is not set to true
CWE-693
Rust
rust/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-693
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-693
Swift
swift/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-693
Swift
swift/missing-regexp-anchor
Missing regular expression anchor
CWE-693
Swift
swift/bad-tag-filter
Bad HTML filtering regexp
CWE-693
Swift
swift/constant-password
Constant password
CWE-693
Swift
swift/cleartext-storage-database
Cleartext storage of sensitive information in a local database
CWE-693
Swift
swift/cleartext-transmission
Cleartext transmission of sensitive information
CWE-693
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-693
Swift
swift/cleartext-storage-preferences
Cleartext storage of sensitive information in an application preference store
CWE-693
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-693
Swift
swift/ecb-encryption
Encryption using ECB
CWE-693
Swift
swift/weak-password-hashing
Use of an inappropriate cryptographic hashing algorithm on passwords
CWE-693
Swift
swift/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-693
Swift
swift/insecure-tls
Insecure TLS configuration
CWE-693
Swift
swift/constant-salt
Use of constant salts
CWE-693
Swift
swift/insufficient-hash-iterations
Insufficient hash iterations
CWE-695
Java/Kotlin
java/ejb/file-io
EJB uses file input/output
CWE-695
Java/Kotlin
java/ejb/graphics
EJB uses graphics
CWE-695
Java/Kotlin
java/ejb/synchronization
EJB uses synchronization
CWE-695
Java/Kotlin
java/ejb/threads
EJB uses threads
CWE-696
Python
py/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-696
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-696
Rust
rust/ctor-initialization
Bad 'ctor' initialization
CWE-697
C/C++
cpp/missing-case-in-switch
Missing enum case in switch
CWE-697
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-697
C#
cs/class-name-comparison
Erroneous class compare
CWE-697
C#
cs/reference-equality-with-object
Reference equality test on System.Object
CWE-697
C#
cs/reference-equality-on-valuetypes
Call to ReferenceEquals(...) on value type expressions
CWE-697
Go
go/cors-misconfiguration
CORS misconfiguration
CWE-697
Java/Kotlin
java/missing-default-in-switch
Missing default case in switch
CWE-697
Java/Kotlin
java/reference-equality-with-object
Reference equality test on java.lang.Object
CWE-697
Java/Kotlin
java/reference-equality-of-boxed-types
Reference equality test of boxed types
CWE-697
Java/Kotlin
java/reference-equality-on-strings
Reference equality test on strings
CWE-697
Java/Kotlin
java/missing-case-in-switch
Missing enum case in switch
CWE-697
Java/Kotlin
java/permissive-dot-regex
URL matched by permissive . in a regular expression
CWE-697
JavaScript/TypeScript
js/angular/insecure-url-whitelist
Insecure URL whitelist
CWE-697
JavaScript/TypeScript
js/incomplete-url-scheme-check
Incomplete URL scheme check
CWE-697
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-697
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-697
JavaScript/TypeScript
js/cors-permissive-configuration
Permissive CORS configuration
CWE-697
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-697
Python
py/bad-tag-filter
Bad HTML filtering regexp
CWE-697
Python
py/cors-misconfiguration-with-credentials
Cors misconfiguration with credentials
CWE-697
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-697
Swift
swift/bad-tag-filter
Bad HTML filtering regexp
CWE-703
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-703
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-703
C/C++
cpp/return-value-ignored
Return value of a function is ignored
CWE-703
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-703
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-703
C/C++
cpp/inconsistent-call-on-result
Inconsistent operation on return value
CWE-703
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-703
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-703
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-703
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-703
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-703
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-703
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-703
C/C++
cpp/improper-check-return-value-scanf
Improper check of return value of scanf
CWE-703
C#
cs/dispose-not-called-on-throw
Dispose may not be called if an exception is thrown during execution
CWE-703
C#
cs/local-not-disposed
Missing Dispose call on local IDisposable
CWE-703
C#
cs/unchecked-return-value
Unchecked return value
CWE-703
C#
cs/catch-nullreferenceexception
Poor error handling: catch of NullReferenceException
CWE-703
C#
cs/empty-catch-block
Poor error handling: empty catch block
CWE-703
C#
cs/catch-of-all-exceptions
Generic catch clause
CWE-703
C#
cs/information-exposure-through-exception
Information exposure through an exception
CWE-703
C#
cs/web/missing-global-error-handler
Missing global error handler
CWE-703
Go
go/missing-error-check
Missing error check
CWE-703
Go
go/unhandled-writable-file-close
Writable file handle closed without error handling
CWE-703
Go
go/redundant-recover
Redundant call to recover
CWE-703
Go
go/stack-trace-exposure
Information exposure through a stack trace
CWE-703
Java/Kotlin
java/inconsistent-call-on-result
Inconsistent operation on return value
CWE-703
Java/Kotlin
java/return-value-ignored
Method result ignored
CWE-703
Java/Kotlin
java/error-message-exposure
Information exposure through an error message
CWE-703
Java/Kotlin
java/stack-trace-exposure
Information exposure through a stack trace
CWE-703
Java/Kotlin
java/unsafe-cert-trust
Unsafe certificate trust
CWE-703
Java/Kotlin
java/discarded-exception
Discarded exception
CWE-703
Java/Kotlin
java/overly-general-catch
Overly-general catch clause
CWE-703
Java/Kotlin
java/ignored-error-status-of-call
Ignored error status of call
CWE-703
Java/Kotlin
java/uncaught-number-format-exception
Missing catch of NumberFormatException
CWE-703
Java/Kotlin
java/uncaught-servlet-exception
Uncaught Servlet Exception
CWE-703
Java/Kotlin
java/android/nfe-local-android-dos
Local Android DoS Caused By NumberFormatException
CWE-703
JavaScript/TypeScript
js/stack-trace-exposure
Information exposure through a stack trace
CWE-703
JavaScript/TypeScript
js/server-crash
Server crash
CWE-703
JavaScript/TypeScript
js/unvalidated-dynamic-method-call
Unvalidated dynamic method call
CWE-703
Python
py/catch-base-exception
Except block handles 'BaseException'
CWE-703
Python
py/empty-except
Empty except
CWE-703
Python
py/ignored-return-value
Ignored return value
CWE-703
Python
py/stack-trace-exposure
Information exposure through an exception
CWE-703
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-704
C/C++
cpp/bad-addition-overflow-check
Bad check for overflow of integer addition
CWE-704
C/C++
cpp/integer-multiplication-cast-to-long
Multiplication result converted to larger type
CWE-704
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-704
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-704
C/C++
cpp/integer-overflow-tainted
Potential integer arithmetic overflow
CWE-704
C/C++
cpp/incorrect-string-type-conversion
Cast from char to wchar_t
CWE-704
C/C++
cpp/type-confusion
Type confusion
CWE-704
C#
cs/loss-of-precision
Possible loss of precision
CWE-704
Go
go/shift-out-of-range
Shift out of range
CWE-704
Go
go/incorrect-integer-conversion
Incorrect conversion between integer types
CWE-704
Java/Kotlin
java/implicit-cast-in-compound-assignment
Implicit narrowing conversion in compound assignment
CWE-704
Java/Kotlin
java/integer-multiplication-cast-to-long
Result of multiplication cast to wider type
CWE-704
Java/Kotlin
java/impossible-array-cast
Impossible array cast
CWE-704
Java/Kotlin
java/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-704
Java/Kotlin
java/tainted-numeric-cast
User-controlled data in numeric cast
CWE-704
JavaScript/TypeScript
js/implicit-operand-conversion
Implicit operand conversion
CWE-704
JavaScript/TypeScript
js/shift-out-of-range
Shift out of range
CWE-704
JavaScript/TypeScript
js/invalid-prototype-value
Invalid prototype value
CWE-704
JavaScript/TypeScript
js/property-assignment-on-primitive
Assignment to property of primitive value
CWE-704
JavaScript/TypeScript
js/type-confusion-through-parameter-tampering
Type confusion through parameter tampering
CWE-705
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-705
C#
cs/catch-nullreferenceexception
Poor error handling: catch of NullReferenceException
CWE-705
C#
cs/catch-of-all-exceptions
Generic catch clause
CWE-705
C#
cs/web/missing-global-error-handler
Missing global error handler
CWE-705
Go
go/redundant-recover
Redundant call to recover
CWE-705
Java/Kotlin
java/ejb/container-interference
EJB interferes with container operation
CWE-705
Java/Kotlin
java/overly-general-catch
Overly-general catch clause
CWE-705
Java/Kotlin
java/uncaught-number-format-exception
Missing catch of NumberFormatException
CWE-705
Java/Kotlin
java/jvm-exit
Forcible JVM termination
CWE-705
Java/Kotlin
java/abnormal-finally-completion
Finally block may not complete normally
CWE-705
Java/Kotlin
java/uncaught-servlet-exception
Uncaught Servlet Exception
CWE-705
JavaScript/TypeScript
js/exit-from-finally
Jump from finally
CWE-705
JavaScript/TypeScript
js/server-crash
Server crash
CWE-705
Python
py/catch-base-exception
Except block handles 'BaseException'
CWE-705
Python
py/exit-from-finally
'break' or 'return' statement in finally
CWE-706
C/C++
cpp/path-injection
Uncontrolled data used in path expression
CWE-706
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-706
C#
cs/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-706
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-706
C#
cs/insecure-xml-read
XML is read insecurely
CWE-706
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-706
Go
go/path-injection
Uncontrolled data used in path expression
CWE-706
Go
go/unsafe-unzip-symlink
Arbitrary file write extracting an archive containing symbolic links
CWE-706
Go
go/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-706
Java/Kotlin
java/path-injection
Uncontrolled data used in path expression
CWE-706
Java/Kotlin
java/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-706
Java/Kotlin
java/partial-path-traversal
Partial path traversal vulnerability
CWE-706
Java/Kotlin
java/partial-path-traversal-from-remote
Partial path traversal vulnerability from remote
CWE-706
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-706
Java/Kotlin
java/openstream-called-on-tainted-url
openStream called on URLs created from remote source
CWE-706
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-706
JavaScript/TypeScript
js/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-706
JavaScript/TypeScript
js/case-sensitive-middleware-path
Case-sensitive middleware path
CWE-706
JavaScript/TypeScript
js/xxe
XML external entity expansion
CWE-706
JavaScript/TypeScript
js/xxe-more-sources
XML external entity expansion with additional heuristic sources
CWE-706
Python
py/path-injection
Uncontrolled data used in path expression
CWE-706
Python
py/tarslip
Arbitrary file write during tarfile extraction
CWE-706
Python
py/xxe
XML external entity expansion
CWE-706
Python
py/zipslip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-706
Python
py/tarslip-extended
Arbitrary file write during tarfile extraction
CWE-706
Python
py/unsafe-unpacking
Arbitrary file write during a tarball extraction from a user controlled source
CWE-706
Ruby
rb/zip-slip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-706
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-706
Ruby
rb/xxe
XML external entity expansion
CWE-706
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-706
Swift
swift/unsafe-unpacking
Arbitrary file write during a zip extraction from a user controlled source
CWE-706
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-706
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-707
GitHub Actions
actions/envpath-injection/critical
PATH environment variable built from user-controlled sources
CWE-707
GitHub Actions
actions/envpath-injection/medium
PATH environment variable built from user-controlled sources
CWE-707
GitHub Actions
actions/envvar-injection/critical
Environment variable built from user-controlled sources
CWE-707
GitHub Actions
actions/envvar-injection/medium
Environment variable built from user-controlled sources
CWE-707
GitHub Actions
actions/code-injection/critical
Code injection
CWE-707
GitHub Actions
actions/code-injection/medium
Code injection
CWE-707
GitHub Actions
actions/cache-poisoning/code-injection
Cache Poisoning via low-privileged code injection
CWE-707
GitHub Actions
actions/output-clobbering/high
Output Clobbering
CWE-707
GitHub Actions
actions/command-injection/critical
Command built from user-controlled sources
CWE-707
GitHub Actions
actions/command-injection/medium
Command built from user-controlled sources
CWE-707
GitHub Actions
actions/argument-injection/critical
Argument injection
CWE-707
GitHub Actions
actions/argument-injection/medium
Argument injection
CWE-707
C/C++
cpp/non-constant-format
Non-constant format string
CWE-707
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-707
C/C++
cpp/improper-null-termination
Potential improper null termination
CWE-707
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-707
C/C++
cpp/command-line-injection
Uncontrolled data used in OS command
CWE-707
C/C++
cpp/cgi-xss
CGI script vulnerable to cross-site scripting
CWE-707
C/C++
cpp/sql-injection
Uncontrolled data in SQL query
CWE-707
C/C++
cpp/tainted-format-string
Uncontrolled format string
CWE-707
C/C++
cpp/user-controlled-null-termination-tainted
User-controlled data may not be null terminated
CWE-707
C/C++
cpp/wordexp-injection
Uncontrolled data used in wordexp command
CWE-707
C#
cs/path-injection
Uncontrolled data used in path expression
CWE-707
C#
cs/command-line-injection
Uncontrolled command line
CWE-707
C#
cs/web/xss
Cross-site scripting
CWE-707
C#
cs/sql-injection
SQL query built from user-controlled sources
CWE-707
C#
cs/ldap-injection
LDAP query built from user-controlled sources
CWE-707
C#
cs/xml-injection
XML injection
CWE-707
C#
cs/code-injection
Improper control of generation of code
CWE-707
C#
cs/resource-injection
Resource injection
CWE-707
C#
cs/log-forging
Log entries created from user input
CWE-707
C#
cs/uncontrolled-format-string
Uncontrolled format string
CWE-707
C#
cs/xml/xpath-injection
XPath injection
CWE-707
C#
cs/inappropriate-encoding
Inappropriate encoding
CWE-707
C#
cs/web/disabled-header-checking
Header checking disabled
CWE-707
C#
cs/webclient-path-injection
Uncontrolled data used in a WebClient
CWE-707
Go
go/path-injection
Uncontrolled data used in path expression
CWE-707
Go
go/command-injection
Command built from user-controlled sources
CWE-707
Go
go/stored-command
Command built from stored data
CWE-707
Go
go/html-template-escaping-bypass-xss
Cross-site scripting via HTML template escaping bypass
CWE-707
Go
go/reflected-xss
Reflected cross-site scripting
CWE-707
Go
go/stored-xss
Stored cross-site scripting
CWE-707
Go
go/sql-injection
Database query built from user-controlled sources
CWE-707
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-707
Go
go/log-injection
Log entries created from user input
CWE-707
Go
go/xml/xpath-injection
XPath injection
CWE-707
Go
go/ldap-injection
LDAP query built from user-controlled sources
CWE-707
Go
go/dsn-injection
SQL Data-source URI built from user-controlled sources
CWE-707
Go
go/dsn-injection-local
SQL Data-source URI built from local user-controlled sources
CWE-707
Java/Kotlin
java/jndi-injection
JNDI lookup with user-controlled name
CWE-707
Java/Kotlin
java/xslt-injection
XSLT transformation with user-controlled stylesheet
CWE-707
Java/Kotlin
java/relative-path-command
Executing a command with a relative path
CWE-707
Java/Kotlin
java/command-line-injection
Uncontrolled command line
CWE-707
Java/Kotlin
java/exec-tainted-environment
Building a command with an injected environment variable
CWE-707
Java/Kotlin
java/concatenated-command-line
Building a command line with string concatenation
CWE-707
Java/Kotlin
java/android/webview-addjavascriptinterface
Access Java object methods through JavaScript exposure
CWE-707
Java/Kotlin
java/android/websettings-javascript-enabled
Android WebView JavaScript settings
CWE-707
Java/Kotlin
java/xss
Cross-site scripting
CWE-707
Java/Kotlin
java/concatenated-sql-query
Query built by concatenation with a possibly-untrusted string
CWE-707
Java/Kotlin
java/sql-injection
Query built from user-controlled sources
CWE-707
Java/Kotlin
java/ldap-injection
LDAP query built from user-controlled sources
CWE-707
Java/Kotlin
java/android/arbitrary-apk-installation
Android APK installation
CWE-707
Java/Kotlin
java/groovy-injection
Groovy Language injection
CWE-707
Java/Kotlin
java/insecure-bean-validation
Insecure Bean Validation
CWE-707
Java/Kotlin
java/jexl-expression-injection
Expression language injection (JEXL)
CWE-707
Java/Kotlin
java/mvel-expression-injection
Expression language injection (MVEL)
CWE-707
Java/Kotlin
java/spel-expression-injection
Expression language injection (Spring)
CWE-707
Java/Kotlin
java/server-side-template-injection
Server-side template injection
CWE-707
Java/Kotlin
java/netty-http-request-or-response-splitting
Disabled Netty HTTP header validation
CWE-707
Java/Kotlin
java/http-response-splitting
HTTP response splitting
CWE-707
Java/Kotlin
java/log-injection
Log Injection
CWE-707
Java/Kotlin
java/tainted-format-string
Use of externally-controlled format string
CWE-707
Java/Kotlin
java/xml/xpath-injection
XPath injection
CWE-707
Java/Kotlin
java/android/unsafe-android-webview-fetch
Unsafe resource fetching in Android WebView
CWE-707
Java/Kotlin
java/ognl-injection
OGNL Expression Language statement with user-controlled input
CWE-707
Java/Kotlin
java/log4j-injection
Potential Log4J LDAP JNDI injection (CVE-2021-44228)
CWE-707
Java/Kotlin
java/command-line-injection-extra
Command Injection into Runtime.exec() with dangerous command
CWE-707
Java/Kotlin
java/command-line-injection-extra-local
Command Injection into Runtime.exec() with dangerous command
CWE-707
Java/Kotlin
java/command-line-injection-experimental
Uncontrolled command line (experimental sinks)
CWE-707
Java/Kotlin
java/mybatis-annotation-sql-injection
SQL injection in MyBatis annotation
CWE-707
Java/Kotlin
java/mybatis-xml-sql-injection
SQL injection in MyBatis Mapper XML
CWE-707
Java/Kotlin
java/beanshell-injection
BeanShell injection
CWE-707
Java/Kotlin
java/android-insecure-dex-loading
Insecure loading of an Android Dex File
CWE-707
Java/Kotlin
java/jshell-injection
JShell injection
CWE-707
Java/Kotlin
java/javaee-expression-injection
Jakarta Expression Language injection
CWE-707
Java/Kotlin
java/jython-injection
Injection in Jython
CWE-707
Java/Kotlin
java/unsafe-eval
Injection in Java Script Engine
CWE-707
Java/Kotlin
java/spring-view-manipulation-implicit
Spring Implicit View Manipulation
CWE-707
Java/Kotlin
java/spring-view-manipulation
Spring View Manipulation
CWE-707
Java/Kotlin
java/xquery-injection
XQuery query built from user-controlled sources
CWE-707
JavaScript/TypeScript
js/angular/disabling-sce
Disabling SCE
CWE-707
JavaScript/TypeScript
js/disabling-electron-websecurity
Disabling Electron webSecurity
CWE-707
JavaScript/TypeScript
js/enabling-electron-renderer-node-integration
Enabling Node.js integration for Electron web content renderers
CWE-707
JavaScript/TypeScript
js/identity-replacement
Replacement of a substring with itself
CWE-707
JavaScript/TypeScript
js/path-injection
Uncontrolled data used in path expression
CWE-707
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-707
JavaScript/TypeScript
js/command-line-injection
Uncontrolled command line
CWE-707
JavaScript/TypeScript
js/indirect-command-line-injection
Indirect uncontrolled command line
CWE-707
JavaScript/TypeScript
js/second-order-command-line-injection
Second order command injection
CWE-707
JavaScript/TypeScript
js/shell-command-injection-from-environment
Shell command built from environment values
CWE-707
JavaScript/TypeScript
js/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-707
JavaScript/TypeScript
js/unnecessary-use-of-cat
Unnecessary use of cat process
CWE-707
JavaScript/TypeScript
js/xss-through-exception
Exception text reinterpreted as HTML
CWE-707
JavaScript/TypeScript
js/reflected-xss
Reflected cross-site scripting
CWE-707
JavaScript/TypeScript
js/stored-xss
Stored cross-site scripting
CWE-707
JavaScript/TypeScript
js/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-707
JavaScript/TypeScript
js/unsafe-jquery-plugin
Unsafe jQuery plugin
CWE-707
JavaScript/TypeScript
js/xss
Client-side cross-site scripting
CWE-707
JavaScript/TypeScript
js/xss-through-dom
DOM text reinterpreted as HTML
CWE-707
JavaScript/TypeScript
js/sql-injection
Database query built from user-controlled sources
CWE-707
JavaScript/TypeScript
js/code-injection
Code injection
CWE-707
JavaScript/TypeScript
js/bad-code-sanitization
Improper code sanitization
CWE-707
JavaScript/TypeScript
js/unsafe-code-construction
Unsafe code constructed from library input
CWE-707
JavaScript/TypeScript
js/unsafe-dynamic-method-access
Unsafe dynamic method access
CWE-707
JavaScript/TypeScript
js/bad-tag-filter
Bad HTML filtering regexp
CWE-707
JavaScript/TypeScript
js/double-escaping
Double escaping or unescaping
CWE-707
JavaScript/TypeScript
js/incomplete-html-attribute-sanitization
Incomplete HTML attribute sanitization
CWE-707
JavaScript/TypeScript
js/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-707
JavaScript/TypeScript
js/incomplete-sanitization
Incomplete string escaping or encoding
CWE-707
JavaScript/TypeScript
js/unsafe-html-expansion
Unsafe expansion of self-closing HTML tag
CWE-707
JavaScript/TypeScript
js/log-injection
Log injection
CWE-707
JavaScript/TypeScript
js/tainted-format-string
Use of externally-controlled format string
CWE-707
JavaScript/TypeScript
js/client-side-unvalidated-url-redirection
Client-side URL redirect
CWE-707
JavaScript/TypeScript
js/xpath-injection
XPath injection
CWE-707
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-707
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-707
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-707
JavaScript/TypeScript
js/code-injection-dynamic-import
Code injection from dynamically imported code
CWE-707
JavaScript/TypeScript
js/env-key-and-value-injection
User controlled arbitrary environment variable injection
CWE-707
JavaScript/TypeScript
js/env-value-injection
User controlled environment variable value injection
CWE-707
JavaScript/TypeScript
js/command-line-injection-more-sources
Uncontrolled command line with additional heuristic sources
CWE-707
JavaScript/TypeScript
js/xss-more-sources
Client-side cross-site scripting with additional heuristic sources
CWE-707
JavaScript/TypeScript
js/sql-injection-more-sources
Database query built from user-controlled sources with additional heuristic sources
CWE-707
JavaScript/TypeScript
js/code-injection-more-sources
Code injection with additional heuristic sources
CWE-707
JavaScript/TypeScript
js/log-injection-more-sources
Log injection with additional heuristic sources
CWE-707
JavaScript/TypeScript
js/tainted-format-string-more-sources
Use of externally-controlled format string with additional heuristic sources
CWE-707
JavaScript/TypeScript
js/xpath-injection-more-sources
XPath injection with additional heuristic sources
CWE-707
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-707
Python
py/use-of-input
'input' function used in Python 2
CWE-707
Python
py/path-injection
Uncontrolled data used in path expression
CWE-707
Python
py/template-injection
Server Side Template Injection
CWE-707
Python
py/command-line-injection
Uncontrolled command line
CWE-707
Python
py/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-707
Python
py/jinja2/autoescape-false
Jinja2 templating with autoescape=False
CWE-707
Python
py/reflective-xss
Reflected server-side cross-site scripting
CWE-707
Python
py/sql-injection
SQL query built from user-controlled sources
CWE-707
Python
py/ldap-injection
LDAP query built from user-controlled sources
CWE-707
Python
py/code-injection
Code injection
CWE-707
Python
py/http-response-splitting
HTTP Response Splitting
CWE-707
Python
py/bad-tag-filter
Bad HTML filtering regexp
CWE-707
Python
py/log-injection
Log Injection
CWE-707
Python
py/xpath-injection
XPath query built from user-controlled sources
CWE-707
Python
py/nosql-injection
NoSQL Injection
CWE-707
Python
py/paramiko-command-injection
Command execution on a secondary remote server
CWE-707
Python
py/reflective-xss-email
Reflected server-side cross-site scripting
CWE-707
Python
py/xslt-injection
XSLT query built from user-controlled sources
CWE-707
Python
py/js2py-rce
JavaScript code execution
CWE-707
Python
py/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-707
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-707
Ruby
rb/ldap-injection
LDAP Injection
CWE-707
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-707
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-707
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-707
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-707
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-707
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-707
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-707
Ruby
rb/reflected-xss
Reflected server-side cross-site scripting
CWE-707
Ruby
rb/stored-xss
Stored cross-site scripting
CWE-707
Ruby
rb/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-707
Ruby
rb/sql-injection
SQL query built from user-controlled sources
CWE-707
Ruby
rb/code-injection
Code injection
CWE-707
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-707
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-707
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-707
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-707
Ruby
rb/log-injection
Log injection
CWE-707
Ruby
rb/tainted-format-string
Use of externally-controlled format string
CWE-707
Rust
rust/regex-injection
Regular expression injection
CWE-707
Rust
rust/path-injection
Uncontrolled data used in path expression
CWE-707
Rust
rust/xss
Cross-site scripting
CWE-707
Rust
rust/sql-injection
Database query built from user-controlled sources
CWE-707
Rust
rust/log-injection
Log injection
CWE-707
Swift
swift/path-injection
Uncontrolled data used in path expression
CWE-707
Swift
swift/command-line-injection
System command built from user-controlled sources
CWE-707
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-707
Swift
swift/sql-injection
Database query built from user-controlled sources
CWE-707
Swift
swift/unsafe-js-eval
JavaScript Injection
CWE-707
Swift
swift/bad-tag-filter
Bad HTML filtering regexp
CWE-707
Swift
swift/uncontrolled-format-string
Uncontrolled format string
CWE-707
Swift
swift/predicate-injection
Predicate built from user-controlled sources
CWE-710
C/C++
cpp/unused-local-variable
Unused local variable
CWE-710
C/C++
cpp/unused-static-function
Unused static function
CWE-710
C/C++
cpp/unused-static-variable
Unused static variable
CWE-710
C/C++
cpp/dead-code-condition
Branching condition always evaluates to same value
CWE-710
C/C++
cpp/dead-code-function
Function is never called
CWE-710
C/C++
cpp/dead-code-goto
Dead code due to goto or break statement
CWE-710
C/C++
cpp/double-free
Potential double free
CWE-710
C/C++
cpp/inconsistent-nullness-testing
Inconsistent null check of pointer
CWE-710
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-710
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-710
C/C++
cpp/missing-null-test
Returned pointer not checked
CWE-710
C/C++
cpp/unused-variable
Variable is assigned a value that is never read
CWE-710
C/C++
cpp/fixme-comment
FIXME comment
CWE-710
C/C++
cpp/todo-comment
TODO comment
CWE-710
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-710
C/C++
cpp/wrong-number-format-arguments
Too few arguments to formatting function
CWE-710
C/C++
cpp/wrong-type-format-argument
Wrong type of arguments to formatting function
CWE-710
C/C++
cpp/inconsistent-null-check
Inconsistent nullness check
CWE-710
C/C++
cpp/useless-expression
Expression has no effect
CWE-710
C/C++
cpp/pointer-overflow-check
Pointer overflow check
CWE-710
C/C++
cpp/bad-strncpy-size
Possibly wrong buffer size in string copy
CWE-710
C/C++
cpp/suspicious-call-to-memset
Suspicious call to memset
CWE-710
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-710
C/C++
cpp/unsafe-strcat
Potentially unsafe use of strcat
CWE-710
C/C++
cpp/redundant-null-check-simple
Redundant null check due to previous dereference
CWE-710
C/C++
cpp/too-few-arguments
Call to function with fewer arguments than declared parameters
CWE-710
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-710
C/C++
cpp/memset-may-be-deleted
Call to memset may be deleted
CWE-710
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-710
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-710
C/C++
cpp/dangerous-function-overflow
Use of dangerous function
CWE-710
C/C++
cpp/dangerous-cin
Dangerous use of 'cin'
CWE-710
C/C++
cpp/potentially-dangerous-function
Use of potentially dangerous function
CWE-710
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-710
C/C++
cpp/twice-locked
Mutex locked twice
CWE-710
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-710
C/C++
cpp/deref-null-result
Null dereference from a function result
CWE-710
C/C++
cpp/redundant-null-check-param
Redundant null check or missing null check of parameter
CWE-710
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-710
C/C++
cpp/wrong-use-of-the-umask
Find the wrong use of the umask function
CWE-710
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-710
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-710
C/C++
cpp/operator-find-incorrectly-used-switch
Incorrect switch statement
CWE-710
C/C++
cpp/double-release
Errors When Double Release
CWE-710
C/C++
cpp/errors-of-undefined-program-behavior
Errors Of Undefined Program Behavior
CWE-710
C#
cs/call-to-obsolete-method
Call to obsolete method
CWE-710
C#
cs/inconsistent-equals-and-gethashcode
Inconsistent Equals(object) and GetHashCode()
CWE-710
C#
cs/todo-comment
TODO comment
CWE-710
C#
cs/dereferenced-value-is-always-null
Dereferenced variable is always null
CWE-710
C#
cs/dereferenced-value-may-be-null
Dereferenced variable may be null
CWE-710
C#
cs/unused-reftype
Dead reference types
CWE-710
C#
cs/useless-assignment-to-local
Useless assignment to local variable
CWE-710
C#
cs/unused-field
Unused field
CWE-710
C#
cs/unused-method
Unused method
CWE-710
C#
cs/useless-cast-to-self
Cast to same type
CWE-710
C#
cs/useless-is-before-as
Useless 'is' before 'as'
CWE-710
C#
cs/coalesce-of-identical-expressions
Useless ?? expression
CWE-710
C#
cs/useless-type-test
Useless type test
CWE-710
C#
cs/useless-upcast
Useless upcast
CWE-710
C#
cs/empty-collection
Container contents are never initialized
CWE-710
C#
cs/unused-collection
Container contents are never accessed
CWE-710
C#
cs/invalid-dynamic-call
Bad dynamic call
CWE-710
C#
cs/empty-lock-statement
Empty lock statement
CWE-710
C#
cs/linq/useless-select
Redundant Select
CWE-710
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-710
C#
cs/web/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-710
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-710
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-710
Go
go/comparison-of-identical-expressions
Comparison of identical values
CWE-710
Go
go/useless-assignment-to-field
Useless assignment to field
CWE-710
Go
go/useless-assignment-to-local
Useless assignment to local variable
CWE-710
Go
go/duplicate-branches
Duplicate 'if' branches
CWE-710
Go
go/duplicate-condition
Duplicate 'if' condition
CWE-710
Go
go/duplicate-switch-case
Duplicate switch case
CWE-710
Go
go/useless-expression
Expression has no effect
CWE-710
Go
go/impossible-interface-nil-check
Impossible interface nil check
CWE-710
Go
go/negative-length-check
Redundant check for negative value
CWE-710
Go
go/redundant-operation
Identical operands
CWE-710
Go
go/redundant-assignment
Self assignment
CWE-710
Go
go/unreachable-statement
Unreachable statement
CWE-710
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-710
Go
go/pam-auth-bypass
PAM authorization bypass due to incorrect usage
CWE-710
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-710
Java/Kotlin
java/deprecated-call
Deprecated method or constructor invocation
CWE-710
Java/Kotlin
java/dead-class
Dead class
CWE-710
Java/Kotlin
java/dead-enum-constant
Dead enum constant
CWE-710
Java/Kotlin
java/dead-field
Dead field
CWE-710
Java/Kotlin
java/dead-function
Dead method
CWE-710
Java/Kotlin
java/lines-of-dead-code
Lines of dead code in files
CWE-710
Java/Kotlin
java/unused-parameter
Useless parameter
CWE-710
Java/Kotlin
java/ejb/container-interference
EJB interferes with container operation
CWE-710
Java/Kotlin
java/ejb/file-io
EJB uses file input/output
CWE-710
Java/Kotlin
java/ejb/graphics
EJB uses graphics
CWE-710
Java/Kotlin
java/ejb/native-code
EJB uses native code
CWE-710
Java/Kotlin
java/ejb/reflection
EJB uses reflection
CWE-710
Java/Kotlin
java/ejb/security-configuration-access
EJB accesses security configuration
CWE-710
Java/Kotlin
java/ejb/substitution-in-serialization
EJB uses substitution in serialization
CWE-710
Java/Kotlin
java/ejb/socket-or-stream-handler-factory
EJB sets socket factory or URL stream handler factory
CWE-710
Java/Kotlin
java/ejb/server-socket
EJB uses server socket
CWE-710
Java/Kotlin
java/ejb/non-final-static-field
EJB uses non-final static field
CWE-710
Java/Kotlin
java/ejb/synchronization
EJB uses synchronization
CWE-710
Java/Kotlin
java/ejb/this
EJB uses 'this' as argument or result
CWE-710
Java/Kotlin
java/ejb/threads
EJB uses threads
CWE-710
Java/Kotlin
java/useless-null-check
Useless null check
CWE-710
Java/Kotlin
java/useless-type-test
Useless type test
CWE-710
Java/Kotlin
java/useless-upcast
Useless upcast
CWE-710
Java/Kotlin
java/missing-call-to-super-clone
Missing super clone
CWE-710
Java/Kotlin
java/empty-container
Container contents are never initialized
CWE-710
Java/Kotlin
java/unused-container
Container contents are never accessed
CWE-710
Java/Kotlin
java/equals-on-unrelated-types
Equals on incomparable types
CWE-710
Java/Kotlin
java/inconsistent-equals-and-hashcode
Inconsistent equals and hashCode
CWE-710
Java/Kotlin
java/constant-comparison
Useless comparison test
CWE-710
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-710
Java/Kotlin
java/missing-super-finalize
Finalizer inconsistency
CWE-710
Java/Kotlin
java/missing-format-argument
Missing format argument
CWE-710
Java/Kotlin
java/unused-format-argument
Unused format argument
CWE-710
Java/Kotlin
java/dereferenced-value-is-always-null
Dereferenced variable is always null
CWE-710
Java/Kotlin
java/dereferenced-expr-may-be-null
Dereferenced expression may be null
CWE-710
Java/Kotlin
java/dereferenced-value-may-be-null
Dereferenced variable may be null
CWE-710
Java/Kotlin
java/empty-synchronized-block
Empty synchronized block
CWE-710
Java/Kotlin
java/unreachable-catch-clause
Unreachable catch clause
CWE-710
Java/Kotlin
java/static-initialization-vector
Using a static initialization vector for encryption
CWE-710
Java/Kotlin
java/potentially-dangerous-function
Use of a potentially dangerous function
CWE-710
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-710
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-710
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-710
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-710
Java/Kotlin
java/todo-comment
TODO/FIXME comments
CWE-710
Java/Kotlin
java/unused-reference-type
Unused classes and interfaces
CWE-710
Java/Kotlin
java/overwritten-assignment-to-local
Assigned value is overwritten
CWE-710
Java/Kotlin
java/useless-assignment-to-local
Useless assignment to local variable
CWE-710
Java/Kotlin
java/empty-finalizer
Empty body of finalizer
CWE-710
Java/Kotlin
java/unused-initialized-local
Local variable is initialized but not used
CWE-710
Java/Kotlin
java/local-variable-is-never-read
Unread local variable
CWE-710
Java/Kotlin
java/unused-field
Unused field
CWE-710
Java/Kotlin
java/unused-label
Unused label
CWE-710
Java/Kotlin
java/unused-local-variable
Unused local variable
CWE-710
Java/Kotlin
java/switch-fall-through
Unterminated switch case
CWE-710
Java/Kotlin
java/do-not-call-finalize
Do not call finalize()
CWE-710
Java/Kotlin
java/redundant-cast
Unnecessary cast
CWE-710
Java/Kotlin
java/unused-import
Unnecessary import
CWE-710
JavaScript/TypeScript
js/todo-comment
TODO comment
CWE-710
JavaScript/TypeScript
js/conflicting-html-attribute
Conflicting HTML element attributes
CWE-710
JavaScript/TypeScript
js/malformed-html-id
Malformed id attribute
CWE-710
JavaScript/TypeScript
js/eval-like-call
Call to eval-like DOM function
CWE-710
JavaScript/TypeScript
js/variable-initialization-conflict
Conflicting variable initialization
CWE-710
JavaScript/TypeScript
js/function-declaration-conflict
Conflicting function declarations
CWE-710
JavaScript/TypeScript
js/useless-assignment-to-global
Useless assignment to global variable
CWE-710
JavaScript/TypeScript
js/useless-assignment-to-local
Useless assignment to local variable
CWE-710
JavaScript/TypeScript
js/overwritten-property
Overwritten property
CWE-710
JavaScript/TypeScript
js/comparison-of-identical-expressions
Comparison of identical values
CWE-710
JavaScript/TypeScript
js/comparison-with-nan
Comparison with NaN
CWE-710
JavaScript/TypeScript
js/duplicate-condition
Duplicate 'if' condition
CWE-710
JavaScript/TypeScript
js/duplicate-property
Duplicate property
CWE-710
JavaScript/TypeScript
js/duplicate-switch-case
Duplicate switch case
CWE-710
JavaScript/TypeScript
js/useless-expression
Expression has no effect
CWE-710
JavaScript/TypeScript
js/comparison-between-incompatible-types
Comparison between inconvertible types
CWE-710
JavaScript/TypeScript
js/redundant-operation
Identical operands
CWE-710
JavaScript/TypeScript
js/redundant-assignment
Self assignment
CWE-710
JavaScript/TypeScript
js/call-to-non-callable
Invocation of non-function
CWE-710
JavaScript/TypeScript
js/property-access-on-non-object
Property access on null or undefined
CWE-710
JavaScript/TypeScript
js/unneeded-defensive-code
Unneeded defensive code
CWE-710
JavaScript/TypeScript
js/useless-type-test
Useless type test
CWE-710
JavaScript/TypeScript
js/conditional-comment
Conditional comments
CWE-710
JavaScript/TypeScript
js/eval-call
Use of eval
CWE-710
JavaScript/TypeScript
js/non-standard-language-feature
Use of platform-specific language features
CWE-710
JavaScript/TypeScript
js/for-in-comprehension
Use of for-in comprehension blocks
CWE-710
JavaScript/TypeScript
js/superfluous-trailing-arguments
Superfluous trailing arguments
CWE-710
JavaScript/TypeScript
js/yield-outside-generator
Yield in non-generator function
CWE-710
JavaScript/TypeScript
js/node/assignment-to-exports-variable
Assignment to exports variable
CWE-710
JavaScript/TypeScript
js/regex/unmatchable-caret
Unmatchable caret in regular expression
CWE-710
JavaScript/TypeScript
js/regex/unmatchable-dollar
Unmatchable dollar in regular expression
CWE-710
JavaScript/TypeScript
js/remote-property-injection
Remote property injection
CWE-710
JavaScript/TypeScript
js/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-710
JavaScript/TypeScript
js/hardcoded-data-interpreted-as-code
Hard-coded data interpreted as code
CWE-710
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-710
JavaScript/TypeScript
js/http-to-file-access
Network data written to file
CWE-710
JavaScript/TypeScript
js/useless-assignment-in-return
Return statement assigns local variable
CWE-710
JavaScript/TypeScript
js/unreachable-statement
Unreachable statement
CWE-710
JavaScript/TypeScript
js/trivial-conditional
Useless conditional
CWE-710
JavaScript/TypeScript
js/remote-property-injection-more-sources
Remote property injection with additional heuristic sources
CWE-710
Python
py/equals-hash-mismatch
Inconsistent equality and hashing
CWE-710
Python
py/call/wrong-named-class-argument
Wrong name for an argument in a class instantiation
CWE-710
Python
py/call/wrong-number-class-arguments
Wrong number of arguments in a class instantiation
CWE-710
Python
py/unreachable-except
Unreachable except block
CWE-710
Python
py/super-not-enclosing-class
First argument to super() is not enclosing class
CWE-710
Python
py/comparison-of-constants
Comparison of constants
CWE-710
Python
py/comparison-of-identical-expressions
Comparison of identical values
CWE-710
Python
py/comparison-missing-self
Maybe missing 'self' in comparison
CWE-710
Python
py/redundant-comparison
Redundant comparison
CWE-710
Python
py/duplicate-key-dict-literal
Duplicate key in dict literal
CWE-710
Python
py/call/wrong-named-argument
Wrong name for an argument in a call
CWE-710
Python
py/percent-format/wrong-arguments
Wrong number of arguments for format
CWE-710
Python
py/call/wrong-arguments
Wrong number of arguments in a call
CWE-710
Python
py/import-deprecated-module
Import of deprecated module
CWE-710
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-710
Python
py/constant-conditional-expression
Constant in conditional expression or statement
CWE-710
Python
py/redundant-assignment
Redundant assignment
CWE-710
Python
py/ineffectual-statement
Statement has no effect
CWE-710
Python
py/unreachable-statement
Unreachable code
CWE-710
Python
py/multiple-definition
Variable defined multiple times
CWE-710
Python
py/unused-local-variable
Unused local variable
CWE-710
Python
py/unused-global-variable
Unused global variable
CWE-710
Ruby
rb/hardcoded-data-interpreted-as-code
Hard-coded data interpreted as code
CWE-710
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-710
Ruby
rb/http-to-file-access
Network data written to file
CWE-710
Ruby
rb/useless-assignment-to-local
Useless assignment to local variable
CWE-710
Ruby
rb/unused-parameter
Unused parameter
CWE-710
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-710
Rust
rust/access-invalid-pointer
Access of invalid pointer
CWE-710
Swift
swift/static-initialization-vector
Static initialization vector for encryption
CWE-710
Swift
swift/constant-password
Constant password
CWE-710
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-732
C/C++
cpp/world-writable-file-creation
File created without restricting permissions
CWE-732
C/C++
cpp/open-call-with-mode-argument
File opened with O_CREAT flag but without mode argument
CWE-732
C/C++
cpp/unsafe-dacl-security-descriptor
Setting a DACL to NULL in a SECURITY_DESCRIPTOR
CWE-732
Java/Kotlin
java/local-temp-file-or-directory-information-disclosure
Local information disclosure in a temporary directory
CWE-732
Java/Kotlin
java/world-writable-file-read
Reading from a world writable file
CWE-732
Python
py/overly-permissive-file
Overly permissive file permissions
CWE-732
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-732
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-733
C/C++
cpp/memset-may-be-deleted
Call to memset may be deleted
CWE-749
Java/Kotlin
java/android/unsafe-android-webview-fetch
Unsafe resource fetching in Android WebView
CWE-749
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-749
Swift
swift/unsafe-js-eval
JavaScript Injection
CWE-754
C/C++
cpp/incorrectly-checked-scanf
Incorrect return-value check for a 'scanf'-like function
CWE-754
C/C++
cpp/missing-check-scanf
Missing return-value check for a 'scanf'-like function
CWE-754
C/C++
cpp/return-value-ignored
Return value of a function is ignored
CWE-754
C/C++
cpp/overflowing-snprintf
Potentially overflowing call to snprintf
CWE-754
C/C++
cpp/inconsistent-call-on-result
Inconsistent operation on return value
CWE-754
C/C++
cpp/ignore-return-value-sal
SAL requires inspecting return value
CWE-754
C/C++
cpp/hresult-boolean-conversion
Cast between HRESULT and a Boolean type
CWE-754
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-754
C/C++
cpp/work-with-changing-working-directories
Find work with changing working directories, with security errors
CWE-754
C/C++
cpp/drop-linux-privileges-outoforder
LinuxPrivilegeDroppingOutoforder
CWE-754
C/C++
cpp/improper-check-return-value-scanf
Improper check of return value of scanf
CWE-754
C#
cs/unchecked-return-value
Unchecked return value
CWE-754
Go
go/missing-error-check
Missing error check
CWE-754
Go
go/unhandled-writable-file-close
Writable file handle closed without error handling
CWE-754
Java/Kotlin
java/inconsistent-call-on-result
Inconsistent operation on return value
CWE-754
Java/Kotlin
java/return-value-ignored
Method result ignored
CWE-754
Java/Kotlin
java/unsafe-cert-trust
Unsafe certificate trust
CWE-754
JavaScript/TypeScript
js/unvalidated-dynamic-method-call
Unvalidated dynamic method call
CWE-754
Python
py/ignored-return-value
Ignored return value
CWE-755
C/C++
cpp/incorrect-allocation-error-handling
Incorrect allocation-error handling
CWE-755
C/C++
cpp/operator-find-incorrectly-used-exceptions
Operator Find Incorrectly Used Exceptions
CWE-755
C#
cs/dispose-not-called-on-throw
Dispose may not be called if an exception is thrown during execution
CWE-755
C#
cs/local-not-disposed
Missing Dispose call on local IDisposable
CWE-755
C#
cs/catch-nullreferenceexception
Poor error handling: catch of NullReferenceException
CWE-755
C#
cs/empty-catch-block
Poor error handling: empty catch block
CWE-755
C#
cs/catch-of-all-exceptions
Generic catch clause
CWE-755
C#
cs/information-exposure-through-exception
Information exposure through an exception
CWE-755
C#
cs/web/missing-global-error-handler
Missing global error handler
CWE-755
Go
go/stack-trace-exposure
Information exposure through a stack trace
CWE-755
Java/Kotlin
java/error-message-exposure
Information exposure through an error message
CWE-755
Java/Kotlin
java/stack-trace-exposure
Information exposure through a stack trace
CWE-755
Java/Kotlin
java/overly-general-catch
Overly-general catch clause
CWE-755
Java/Kotlin
java/android/nfe-local-android-dos
Local Android DoS Caused By NumberFormatException
CWE-755
JavaScript/TypeScript
js/stack-trace-exposure
Information exposure through a stack trace
CWE-755
Python
py/catch-base-exception
Except block handles 'BaseException'
CWE-755
Python
py/empty-except
Empty except
CWE-755
Python
py/stack-trace-exposure
Information exposure through an exception
CWE-755
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-756
C#
cs/web/missing-global-error-handler
Missing global error handler
CWE-757
Swift
swift/insecure-tls
Insecure TLS configuration
CWE-758
C/C++
cpp/pointer-overflow-check
Pointer overflow check
CWE-758
C/C++
cpp/memset-may-be-deleted
Call to memset may be deleted
CWE-758
C/C++
cpp/errors-of-undefined-program-behavior
Errors Of Undefined Program Behavior
CWE-758
JavaScript/TypeScript
js/conflicting-html-attribute
Conflicting HTML element attributes
CWE-758
JavaScript/TypeScript
js/malformed-html-id
Malformed id attribute
CWE-758
JavaScript/TypeScript
js/conditional-comment
Conditional comments
CWE-758
JavaScript/TypeScript
js/non-standard-language-feature
Use of platform-specific language features
CWE-758
JavaScript/TypeScript
js/for-in-comprehension
Use of for-in comprehension blocks
CWE-758
JavaScript/TypeScript
js/yield-outside-generator
Yield in non-generator function
CWE-759
C#
cs/hash-without-salt
Use of a hash function without a salt
CWE-759
Java/Kotlin
java/hash-without-salt
Use of a hash function without a salt
CWE-760
Swift
swift/constant-salt
Use of constant salts
CWE-764
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-764
C/C++
cpp/twice-locked
Mutex locked twice
CWE-764
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-764
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-770
C/C++
cpp/alloca-in-loop
Call to alloca in a loop
CWE-770
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-770
Go
go/uncontrolled-allocation-size
Slice memory allocation with excessive size value
CWE-770
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-770
JavaScript/TypeScript
js/resource-exhaustion
Resource exhaustion
CWE-770
JavaScript/TypeScript
js/resource-exhaustion-more-sources
Resource exhaustion with additional heuristic sources
CWE-770
Python
py/unicode-dos
Denial of Service using Unicode Characters
CWE-770
Rust
rust/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-772
C/C++
cpp/catch-missing-free
Leaky catch
CWE-772
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-772
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-772
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-772
C/C++
cpp/file-never-closed
Open file is not closed
CWE-772
C/C++
cpp/memory-may-not-be-freed
Memory may not be freed
CWE-772
C/C++
cpp/memory-never-freed
Memory is never freed
CWE-772
C/C++
cpp/new-free-mismatch
Mismatching new/free or malloc/delete
CWE-772
C/C++
cpp/memory-leak-on-failed-call-to-realloc
Memory leak on failed call to realloc
CWE-772
Java/Kotlin
java/input-resource-leak
Potential input resource leak
CWE-772
Java/Kotlin
java/database-resource-leak
Potential database resource leak
CWE-772
Java/Kotlin
java/output-resource-leak
Potential output resource leak
CWE-772
Python
py/file-not-closed
File is not always closed
CWE-775
C/C++
cpp/descriptor-may-not-be-closed
Open descriptor may not be closed
CWE-775
C/C++
cpp/descriptor-never-closed
Open descriptor never closed
CWE-775
C/C++
cpp/file-may-not-be-closed
Open file may not be closed
CWE-775
C/C++
cpp/file-never-closed
Open file is not closed
CWE-776
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-776
C#
cs/insecure-xml-read
XML is read insecurely
CWE-776
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-776
JavaScript/TypeScript
js/xml-bomb
XML internal entity expansion
CWE-776
JavaScript/TypeScript
js/xml-bomb-more-sources
XML internal entity expansion with additional heuristic sources
CWE-776
Python
py/xml-bomb
XML internal entity expansion
CWE-776
Python
py/simple-xml-rpc-server-dos
SimpleXMLRPCServer denial of service
CWE-776
Ruby
rb/xxe
XML external entity expansion
CWE-776
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-780
C#
cs/inadequate-rsa-padding
Weak encryption: inadequate RSA padding
CWE-780
Java/Kotlin
java/rsa-without-oaep
Use of RSA algorithm without OAEP
CWE-783
C/C++
cpp/operator-precedence-logic-error-when-use-bitwise-logical-operations
Operator Precedence Logic Error When Use Bitwise Or Logical Operations
CWE-783
C/C++
cpp/operator-precedence-logic-error-when-use-bool-type
Operator Precedence Logic Error When Use Bool Type
CWE-783
Go
go/whitespace-contradicts-precedence
Whitespace contradicts operator precedence
CWE-783
Java/Kotlin
java/whitespace-contradicts-precedence
Whitespace contradicts operator precedence
CWE-783
JavaScript/TypeScript
js/unclear-operator-precedence
Unclear precedence of nested operators
CWE-783
JavaScript/TypeScript
js/whitespace-contradicts-precedence
Whitespace contradicts operator precedence
CWE-787
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-787
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-787
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-787
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-787
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-787
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-787
C/C++
cpp/unbounded-write
Unbounded write
CWE-787
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-787
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-787
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-787
C/C++
cpp/invalid-pointer-deref
Invalid pointer dereference
CWE-787
C/C++
cpp/sign-conversion-pointer-arithmetic
unsigned to signed used in pointer arithmetic
CWE-787
C#
cs/unvalidated-local-pointer-arithmetic
Unvalidated local pointer arithmetic
CWE-788
C/C++
cpp/allocation-too-small
Not enough memory allocated for pointer type
CWE-788
C/C++
cpp/suspicious-allocation-size
Not enough memory allocated for array of pointer type
CWE-788
C/C++
cpp/unsafe-strncat
Potentially unsafe call to strncat
CWE-788
C/C++
cpp/overflow-buffer
Call to memory access function may overflow buffer
CWE-788
C/C++
cpp/unterminated-variadic-call
Unterminated variadic call
CWE-788
C/C++
cpp/no-space-for-terminator
No space for zero terminator
CWE-788
C/C++
cpp/openssl-heartbleed
Use of a version of OpenSSL with Heartbleed
CWE-788
C/C++
cpp/access-memory-location-after-end-buffer-strlen
Access Of Memory Location After End Of Buffer
CWE-788
C#
cs/unvalidated-local-pointer-arithmetic
Unvalidated local pointer arithmetic
CWE-788
Go
go/wrong-usage-of-unsafe
Wrong usage of package unsafe
CWE-789
C/C++
cpp/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-789
Rust
rust/uncontrolled-allocation-size
Uncontrolled allocation size
CWE-798
C#
cs/hard-coded-symmetric-encryption-key
Hard-coded symmetric encryption key
CWE-798
C#
cs/hardcoded-connection-string-credentials
Hard-coded connection string with credentials
CWE-798
C#
cs/hardcoded-credentials
Hard-coded credentials
CWE-798
Go
go/hardcoded-credentials
Hard-coded credentials
CWE-798
Go
go/parse-jwt-with-hardcoded-key
Decoding JWT with hardcoded key
CWE-798
Java/Kotlin
java/hardcoded-credential-api-call
Hard-coded credential in API call
CWE-798
Java/Kotlin
java/hardcoded-credential-comparison
Hard-coded credential comparison
CWE-798
Java/Kotlin
java/hardcoded-credential-sensitive-call
Hard-coded credential in sensitive call
CWE-798
Java/Kotlin
java/hardcoded-password-field
Hard-coded password field
CWE-798
JavaScript/TypeScript
js/hardcoded-credentials
Hard-coded credentials
CWE-798
Python
py/hardcoded-credentials
Hard-coded credentials
CWE-798
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-798
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-798
Swift
swift/constant-password
Constant password
CWE-798
Swift
swift/hardcoded-key
Hard-coded encryption key
CWE-799
JavaScript/TypeScript
js/missing-rate-limiting
Missing rate limiting
CWE-805
C/C++
cpp/badly-bounded-write
Badly bounded write
CWE-805
C/C++
cpp/overrunning-write
Potentially overrunning write
CWE-805
C/C++
cpp/overrunning-write-with-float
Potentially overrunning write with float to string conversion
CWE-805
C/C++
cpp/unbounded-write
Unbounded write
CWE-805
C/C++
cpp/very-likely-overrunning-write
Likely overrunning write
CWE-805
C/C++
cpp/buffer-access-with-incorrect-length-value
Buffer access with incorrect length value
CWE-807
C/C++
cpp/tainted-permissions-check
Untrusted input for a condition
CWE-807
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-807
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-807
Java/Kotlin
java/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-807
Java/Kotlin
java/tainted-permissions-check
User-controlled data used in permissions check
CWE-807
JavaScript/TypeScript
js/user-controlled-bypass
User-controlled bypass of security check
CWE-807
JavaScript/TypeScript
js/different-kinds-comparison-bypass
Comparison of user-controlled data of different kinds
CWE-807
JavaScript/TypeScript
js/user-controlled-bypass-more-sources
User-controlled bypass of security check with additional heuristic sources
CWE-807
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-820
C#
cs/unsynchronized-static-access
Unsynchronized access to static collection member in non-static context
CWE-820
Java/Kotlin
java/lazy-initialization
Incorrect lazy initialization of a static field
CWE-820
Java/Kotlin
java/non-sync-override
Non-synchronized override of synchronized method
CWE-821
Java/Kotlin
java/ejb/synchronization
EJB uses synchronization
CWE-821
Java/Kotlin
java/call-to-thread-run
Direct call to a run() method
CWE-823
C/C++
cpp/late-negative-test
Pointer offset used before it is checked
CWE-823
C/C++
cpp/missing-negativity-test
Unchecked return value used as offset
CWE-825
C/C++
cpp/double-free
Potential double free
CWE-825
C/C++
cpp/use-after-free
Potential use after free
CWE-825
C/C++
cpp/return-stack-allocated-memory
Returning stack-allocated memory
CWE-825
C/C++
cpp/using-expired-stack-address
Use of expired stack-address
CWE-825
C/C++
cpp/iterator-to-expired-container
Iterator to expired container
CWE-825
C/C++
cpp/use-of-string-after-lifetime-ends
Use of string after lifetime ends
CWE-825
C/C++
cpp/use-of-unique-pointer-after-lifetime-ends
Use of unique pointer after lifetime ends
CWE-825
C/C++
cpp/experimental-double-free
Errors When Double Free
CWE-825
C/C++
cpp/use-after-expired-lifetime
Use of object after its lifetime has ended
CWE-825
C/C++
cpp/dangerous-use-of-exception-blocks
Dangerous use of exception blocks
CWE-825
Rust
rust/access-after-lifetime-ended
Access of a pointer after its lifetime has ended
CWE-825
Rust
rust/access-invalid-pointer
Access of invalid pointer
CWE-826
C/C++
cpp/self-assignment-check
Self assignment check
CWE-827
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-827
C#
cs/insecure-xml-read
XML is read insecurely
CWE-827
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-827
JavaScript/TypeScript
js/xxe
XML external entity expansion
CWE-827
JavaScript/TypeScript
js/xxe-more-sources
XML external entity expansion with additional heuristic sources
CWE-827
Python
py/xxe
XML external entity expansion
CWE-827
Ruby
rb/xxe
XML external entity expansion
CWE-827
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-829
GitHub Actions
actions/artifact-poisoning/critical
Artifact poisoning
CWE-829
GitHub Actions
actions/artifact-poisoning/medium
Artifact poisoning
CWE-829
GitHub Actions
actions/unpinned-tag
Unpinned tag for a non-immutable Action in workflow
CWE-829
GitHub Actions
actions/untrusted-checkout/critical
Checkout of untrusted code in a privileged context
CWE-829
GitHub Actions
actions/untrusted-checkout/high
Checkout of untrusted code in trusted context
CWE-829
GitHub Actions
actions/untrusted-checkout/medium
Checkout of untrusted code in trusted context
CWE-829
GitHub Actions
actions/artifact-poisoning/path-traversal
Artifact Poisoning (Path Traversal)
CWE-829
GitHub Actions
actions/unversioned-immutable-action
Unversioned Immutable Action
CWE-829
C#
cs/web/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-829
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-829
C#
cs/insecure-xml-read
XML is read insecurely
CWE-829
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-829
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-829
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-829
JavaScript/TypeScript
js/missing-x-frame-options
Missing X-Frame-Options HTTP header
CWE-829
JavaScript/TypeScript
js/xxe
XML external entity expansion
CWE-829
JavaScript/TypeScript
js/insecure-download
Download of sensitive file through insecure connection
CWE-829
JavaScript/TypeScript
js/functionality-from-untrusted-domain
Untrusted domain used in script or other content
CWE-829
JavaScript/TypeScript
js/functionality-from-untrusted-source
Inclusion of functionality from an untrusted source
CWE-829
JavaScript/TypeScript
js/xxe-more-sources
XML external entity expansion with additional heuristic sources
CWE-829
Python
py/xxe
XML external entity expansion
CWE-829
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-829
Ruby
rb/xxe
XML external entity expansion
CWE-829
Ruby
rb/insecure-download
Download of sensitive file through insecure connection
CWE-829
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-830
JavaScript/TypeScript
js/functionality-from-untrusted-domain
Untrusted domain used in script or other content
CWE-830
JavaScript/TypeScript
js/functionality-from-untrusted-source
Inclusion of functionality from an untrusted source
CWE-833
C/C++
cpp/lock-order-cycle
Cyclic lock order dependency
CWE-833
C/C++
cpp/twice-locked
Mutex locked twice
CWE-833
C/C++
cpp/unreleased-lock
Lock may not be released
CWE-833
C#
cs/locked-wait
A lock is held during a wait
CWE-833
Java/Kotlin
java/sleep-with-lock-held
Sleep with lock held
CWE-833
Java/Kotlin
java/unreleased-lock
Unreleased lock
CWE-833
Java/Kotlin
java/wait-with-two-locks
Wait with two locks held
CWE-833
Java/Kotlin
java/lock-order-inconsistency
Lock order inconsistency
CWE-834
C/C++
cpp/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-834
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-834
C/C++
cpp/infinite-loop-with-unsatisfiable-exit-condition
Infinite loop with unsatisfiable exit condition
CWE-834
C#
cs/constant-condition
Constant condition
CWE-834
C#
cs/linq/inconsistent-enumeration
Bad multiple iteration
CWE-834
C#
cs/xml/insecure-dtd-handling
Untrusted XML is read insecurely
CWE-834
C#
cs/insecure-xml-read
XML is read insecurely
CWE-834
Go
go/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-834
Java/Kotlin
java/constant-loop-condition
Constant loop condition
CWE-834
Java/Kotlin
java/xxe
Resolving XML external entity in user-controlled data
CWE-834
Java/Kotlin
java/unreachable-exit-in-loop
Loop with unreachable exit condition
CWE-834
JavaScript/TypeScript
js/xml-bomb
XML internal entity expansion
CWE-834
JavaScript/TypeScript
js/loop-bound-injection
Loop bound injection
CWE-834
JavaScript/TypeScript
js/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-834
JavaScript/TypeScript
js/xml-bomb-more-sources
XML internal entity expansion with additional heuristic sources
CWE-834
Python
py/xml-bomb
XML internal entity expansion
CWE-834
Python
py/simple-xml-rpc-server-dos
SimpleXMLRPCServer denial of service
CWE-834
Ruby
rb/xxe
XML external entity expansion
CWE-834
Swift
swift/xxe
Resolving XML external entity in user-controlled data
CWE-835
C/C++
cpp/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-835
C/C++
cpp/comparison-with-wider-type
Comparison of narrow type with wide type in loop condition
CWE-835
C/C++
cpp/infinite-loop-with-unsatisfiable-exit-condition
Infinite loop with unsatisfiable exit condition
CWE-835
C#
cs/constant-condition
Constant condition
CWE-835
Go
go/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-835
Java/Kotlin
java/constant-loop-condition
Constant loop condition
CWE-835
Java/Kotlin
java/unreachable-exit-in-loop
Loop with unreachable exit condition
CWE-835
JavaScript/TypeScript
js/inconsistent-loop-direction
Inconsistent direction of for loop
CWE-838
C#
cs/inappropriate-encoding
Inappropriate encoding
CWE-843
C/C++
cpp/upcast-array-pointer-arithmetic
Upcast array used in pointer arithmetic
CWE-843
C/C++
cpp/type-confusion
Type confusion
CWE-843
JavaScript/TypeScript
js/type-confusion-through-parameter-tampering
Type confusion through parameter tampering
CWE-862
C#
cs/empty-password-in-configuration
Empty password in configuration file
CWE-862
C#
cs/web/missing-function-level-access-control
Missing function level access control
CWE-862
C#
cs/web/insecure-direct-object-reference
Insecure Direct Object Reference
CWE-862
Java/Kotlin
java/incorrect-url-verification
Incorrect URL verification
CWE-862
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-862
JavaScript/TypeScript
js/empty-password-in-configuration-file
Empty password in configuration file
CWE-862
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-863
Java/Kotlin
java/permissive-dot-regex
URL matched by permissive . in a regular expression
CWE-908
C/C++
cpp/improper-check-return-value-scanf
Improper check of return value of scanf
CWE-909
C/C++
cpp/initialization-not-run
Initialization code not run
CWE-912
JavaScript/TypeScript
js/hardcoded-data-interpreted-as-code
Hard-coded data interpreted as code
CWE-912
JavaScript/TypeScript
js/http-to-file-access
Network data written to file
CWE-912
Ruby
rb/hardcoded-data-interpreted-as-code
Hard-coded data interpreted as code
CWE-912
Ruby
rb/http-to-file-access
Network data written to file
CWE-913
GitHub Actions
actions/code-injection/critical
Code injection
CWE-913
GitHub Actions
actions/code-injection/medium
Code injection
CWE-913
GitHub Actions
actions/cache-poisoning/code-injection
Cache Poisoning via low-privileged code injection
CWE-913
C#
cs/code-injection
Improper control of generation of code
CWE-913
C#
cs/deserialized-delegate
Deserialized delegate
CWE-913
C#
cs/unsafe-deserialization
Unsafe deserializer
CWE-913
C#
cs/unsafe-deserialization-untrusted-input
Deserialization of untrusted data
CWE-913
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-913
Java/Kotlin
java/android/arbitrary-apk-installation
Android APK installation
CWE-913
Java/Kotlin
java/groovy-injection
Groovy Language injection
CWE-913
Java/Kotlin
java/insecure-bean-validation
Insecure Bean Validation
CWE-913
Java/Kotlin
java/jexl-expression-injection
Expression language injection (JEXL)
CWE-913
Java/Kotlin
java/mvel-expression-injection
Expression language injection (MVEL)
CWE-913
Java/Kotlin
java/spel-expression-injection
Expression language injection (Spring)
CWE-913
Java/Kotlin
java/server-side-template-injection
Server-side template injection
CWE-913
Java/Kotlin
java/android/fragment-injection
Android fragment injection
CWE-913
Java/Kotlin
java/android/fragment-injection-preference-activity
Android fragment injection in PreferenceActivity
CWE-913
Java/Kotlin
java/unsafe-deserialization
Deserialization of user-controlled data
CWE-913
Java/Kotlin
java/log4j-injection
Potential Log4J LDAP JNDI injection (CVE-2021-44228)
CWE-913
Java/Kotlin
java/beanshell-injection
BeanShell injection
CWE-913
Java/Kotlin
java/android-insecure-dex-loading
Insecure loading of an Android Dex File
CWE-913
Java/Kotlin
java/jshell-injection
JShell injection
CWE-913
Java/Kotlin
java/javaee-expression-injection
Jakarta Expression Language injection
CWE-913
Java/Kotlin
java/jython-injection
Injection in Jython
CWE-913
Java/Kotlin
java/unsafe-eval
Injection in Java Script Engine
CWE-913
Java/Kotlin
java/spring-view-manipulation-implicit
Spring Implicit View Manipulation
CWE-913
Java/Kotlin
java/spring-view-manipulation
Spring View Manipulation
CWE-913
Java/Kotlin
java/android/unsafe-reflection
Load 3rd party classes or code ('unsafe reflection') without signature check
CWE-913
Java/Kotlin
java/unsafe-reflection
Use of externally-controlled input to select classes or code ('unsafe reflection')
CWE-913
Java/Kotlin
java/unsafe-deserialization-rmi
Unsafe deserialization in a remotely callable method
CWE-913
Java/Kotlin
java/unsafe-deserialization-spring-exporter-in-configuration-class
Unsafe deserialization with Spring's remote service exporters
CWE-913
Java/Kotlin
java/unsafe-deserialization-spring-exporter-in-xml-configuration
Unsafe deserialization with Spring's remote service exporters
CWE-913
JavaScript/TypeScript
js/enabling-electron-renderer-node-integration
Enabling Node.js integration for Electron web content renderers
CWE-913
JavaScript/TypeScript
js/template-object-injection
Template Object Injection
CWE-913
JavaScript/TypeScript
js/code-injection
Code injection
CWE-913
JavaScript/TypeScript
js/bad-code-sanitization
Improper code sanitization
CWE-913
JavaScript/TypeScript
js/unsafe-code-construction
Unsafe code constructed from library input
CWE-913
JavaScript/TypeScript
js/unsafe-dynamic-method-access
Unsafe dynamic method access
CWE-913
JavaScript/TypeScript
js/unsafe-deserialization
Deserialization of user-controlled data
CWE-913
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-913
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-913
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-913
JavaScript/TypeScript
js/code-injection-dynamic-import
Code injection from dynamically imported code
CWE-913
JavaScript/TypeScript
js/code-injection-more-sources
Code injection with additional heuristic sources
CWE-913
JavaScript/TypeScript
js/unsafe-deserialization-more-sources
Deserialization of user-controlled data with additional heuristic sources
CWE-913
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-913
Python
py/use-of-input
'input' function used in Python 2
CWE-913
Python
py/code-injection
Code injection
CWE-913
Python
py/unsafe-deserialization
Deserialization of user-controlled data
CWE-913
Python
py/js2py-rce
JavaScript code execution
CWE-913
Ruby
rb/unsafe-unsafeyamldeserialization
Deserialization of user-controlled yaml data
CWE-913
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-913
Ruby
rb/code-injection
Code injection
CWE-913
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-913
Ruby
rb/unsafe-deserialization
Deserialization of user-controlled data
CWE-913
Ruby
rb/insecure-mass-assignment
Insecure Mass Assignment
CWE-913
Swift
swift/unsafe-webview-fetch
Unsafe WebView fetch
CWE-913
Swift
swift/unsafe-js-eval
JavaScript Injection
CWE-915
JavaScript/TypeScript
js/prototype-polluting-assignment
Prototype-polluting assignment
CWE-915
JavaScript/TypeScript
js/prototype-pollution-utility
Prototype-polluting function
CWE-915
JavaScript/TypeScript
js/prototype-pollution
Prototype-polluting merge call
CWE-915
JavaScript/TypeScript
js/prototype-polluting-assignment-more-sources
Prototype-polluting assignment with additional heuristic sources
CWE-915
Ruby
rb/insecure-mass-assignment
Insecure Mass Assignment
CWE-916
C#
cs/hash-without-salt
Use of a hash function without a salt
CWE-916
Go
go/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-916
Java/Kotlin
java/hash-without-salt
Use of a hash function without a salt
CWE-916
JavaScript/TypeScript
js/insufficient-password-hash
Use of password hash with insufficient computational effort
CWE-916
Python
py/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-916
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-916
Rust
rust/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-916
Swift
swift/weak-password-hashing
Use of an inappropriate cryptographic hashing algorithm on passwords
CWE-916
Swift
swift/constant-salt
Use of constant salts
CWE-916
Swift
swift/insufficient-hash-iterations
Insufficient hash iterations
CWE-917
Java/Kotlin
java/ognl-injection
OGNL Expression Language statement with user-controlled input
CWE-918
GitHub Actions
actions/request-forgery
Uncontrolled data used in network request
CWE-918
C#
cs/request-forgery
Server-side request forgery
CWE-918
Go
go/request-forgery
Uncontrolled data used in network request
CWE-918
Go
go/ssrf
Uncontrolled data used in network request
CWE-918
Java/Kotlin
java/ssrf
Server-side request forgery
CWE-918
JavaScript/TypeScript
js/client-side-request-forgery
Client-side request forgery
CWE-918
JavaScript/TypeScript
js/request-forgery
Server-side request forgery
CWE-918
JavaScript/TypeScript
javascript/ssrf
Uncontrolled data used in network request
CWE-918
Python
py/full-ssrf
Full server-side request forgery
CWE-918
Python
py/partial-ssrf
Partial server-side request forgery
CWE-918
Ruby
rb/request-forgery
Server-side request forgery
CWE-918
Rust
rust/request-forgery
Server-side request forgery
CWE-922
GitHub Actions
actions/excessive-secrets-exposure
Excessive Secrets Exposure
CWE-922
GitHub Actions
actions/secrets-in-artifacts
Storage of sensitive information in GitHub Actions artifact
CWE-922
GitHub Actions
actions/unmasked-secret-exposure
Unmasked Secret Exposure
CWE-922
C/C++
cpp/cleartext-storage-buffer
Cleartext storage of sensitive information in buffer
CWE-922
C/C++
cpp/cleartext-storage-file
Cleartext storage of sensitive information in file
CWE-922
C/C++
cpp/cleartext-storage-database
Cleartext storage of sensitive information in an SQLite database
CWE-922
C#
cs/password-in-configuration
Password in configuration file
CWE-922
C#
cs/cleartext-storage-of-sensitive-information
Clear text storage of sensitive information
CWE-922
Go
go/clear-text-logging
Clear-text logging of sensitive information
CWE-922
Java/Kotlin
java/android/backup-enabled
Application backup allowed
CWE-922
Java/Kotlin
java/android/cleartext-storage-database
Cleartext storage of sensitive information using a local database on Android
CWE-922
Java/Kotlin
java/android/cleartext-storage-filesystem
Cleartext storage of sensitive information in the Android filesystem
CWE-922
Java/Kotlin
java/cleartext-storage-in-class
Cleartext storage of sensitive information using storable class
CWE-922
Java/Kotlin
java/cleartext-storage-in-cookie
Cleartext storage of sensitive information in cookie
CWE-922
Java/Kotlin
java/cleartext-storage-in-properties
Cleartext storage of sensitive information using 'Properties' class
CWE-922
Java/Kotlin
java/android/cleartext-storage-shared-prefs
Cleartext storage of sensitive information using SharedPreferences on Android
CWE-922
JavaScript/TypeScript
js/build-artifact-leak
Storage of sensitive information in build artifact
CWE-922
JavaScript/TypeScript
js/clear-text-logging
Clear-text logging of sensitive information
CWE-922
JavaScript/TypeScript
js/clear-text-storage-of-sensitive-data
Clear text storage of sensitive information
CWE-922
JavaScript/TypeScript
js/password-in-configuration-file
Password in configuration file
CWE-922
JavaScript/TypeScript
js/clear-text-cookie
Clear text transmission of sensitive cookie
CWE-922
Python
py/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-922
Python
py/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-922
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-922
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-922
Rust
rust/cleartext-logging
Cleartext logging of sensitive information
CWE-922
Rust
rust/cleartext-storage-database
Cleartext storage of sensitive information in a database
CWE-922
Swift
swift/cleartext-storage-database
Cleartext storage of sensitive information in a local database
CWE-922
Swift
swift/cleartext-logging
Cleartext logging of sensitive information
CWE-922
Swift
swift/cleartext-storage-preferences
Cleartext storage of sensitive information in an application preference store
CWE-923
C#
cs/user-controlled-bypass
User-controlled bypass of sensitive method
CWE-923
Go
go/insecure-hostkeycallback
Use of insecure HostKeyCallback implementation
CWE-923
Go
go/sensitive-condition-bypass
User-controlled bypassing of sensitive action
CWE-923
Java/Kotlin
java/insecure-smtp-ssl
Insecure JavaMail SSL Configuration
CWE-923
Java/Kotlin
java/unsafe-hostname-verification
Unsafe hostname verification
CWE-923
Java/Kotlin
java/socket-auth-race-condition
Race condition in socket authentication
CWE-923
Java/Kotlin
java/maven/non-https-url
Failure to use HTTPS or SFTP URL in Maven artifact upload/download
CWE-923
Java/Kotlin
java/improper-intent-verification
Improper verification of intent by broadcast receiver
CWE-923
Java/Kotlin
java/android/intent-redirection
Android Intent redirection
CWE-923
Java/Kotlin
java/ignored-hostname-verification
Ignored result of hostname verification
CWE-923
Java/Kotlin
java/insecure-ldaps-endpoint
Insecure LDAPS Endpoint Configuration
CWE-923
JavaScript/TypeScript
js/missing-origin-check
Missing origin verification in postMessage handler
CWE-923
JavaScript/TypeScript
js/disabling-certificate-validation
Disabling certificate validation
CWE-923
JavaScript/TypeScript
js/insecure-dependency
Dependency download using unencrypted communication channel
CWE-923
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-925
Java/Kotlin
java/improper-intent-verification
Improper verification of intent by broadcast receiver
CWE-926
Java/Kotlin
java/android/intent-uri-permission-manipulation
Intent URI permission manipulation
CWE-926
Java/Kotlin
java/android/incomplete-provider-permissions
Missing read or write permission in a content provider
CWE-926
Java/Kotlin
java/android/implicitly-exported-component
Implicitly exported Android component
CWE-926
Java/Kotlin
java/android/intent-redirection
Android Intent redirection
CWE-927
Java/Kotlin
java/android/implicit-pendingintents
Use of implicit PendingIntents
CWE-927
Java/Kotlin
java/android/sensitive-communication
Leaking sensitive information through an implicit Intent
CWE-927
Java/Kotlin
java/android/sensitive-result-receiver
Leaking sensitive information through a ResultReceiver
CWE-939
Java/Kotlin
java/incorrect-url-verification
Incorrect URL verification
CWE-940
Java/Kotlin
java/android/intent-redirection
Android Intent redirection
CWE-940
JavaScript/TypeScript
js/missing-origin-check
Missing origin verification in postMessage handler
CWE-942
Go
go/cors-misconfiguration
CORS misconfiguration
CWE-942
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials
CORS misconfiguration for credentials transfer
CWE-942
JavaScript/TypeScript
js/cors-permissive-configuration
Permissive CORS configuration
CWE-942
JavaScript/TypeScript
js/cors-misconfiguration-for-credentials-more-sources
CORS misconfiguration for credentials transfer with additional heuristic sources
CWE-942
Python
py/cors-misconfiguration-with-credentials
Cors misconfiguration with credentials
CWE-943
C/C++
cpp/sql-injection
Uncontrolled data in SQL query
CWE-943
C#
cs/sql-injection
SQL query built from user-controlled sources
CWE-943
C#
cs/ldap-injection
LDAP query built from user-controlled sources
CWE-943
C#
cs/xml/xpath-injection
XPath injection
CWE-943
Go
go/sql-injection
Database query built from user-controlled sources
CWE-943
Go
go/unsafe-quoting
Potentially unsafe quoting
CWE-943
Go
go/xml/xpath-injection
XPath injection
CWE-943
Go
go/ldap-injection
LDAP query built from user-controlled sources
CWE-943
Java/Kotlin
java/concatenated-sql-query
Query built by concatenation with a possibly-untrusted string
CWE-943
Java/Kotlin
java/sql-injection
Query built from user-controlled sources
CWE-943
Java/Kotlin
java/ldap-injection
LDAP query built from user-controlled sources
CWE-943
Java/Kotlin
java/xml/xpath-injection
XPath injection
CWE-943
Java/Kotlin
java/mybatis-annotation-sql-injection
SQL injection in MyBatis annotation
CWE-943
Java/Kotlin
java/mybatis-xml-sql-injection
SQL injection in MyBatis Mapper XML
CWE-943
Java/Kotlin
java/xquery-injection
XQuery query built from user-controlled sources
CWE-943
JavaScript/TypeScript
js/sql-injection
Database query built from user-controlled sources
CWE-943
JavaScript/TypeScript
js/xpath-injection
XPath injection
CWE-943
JavaScript/TypeScript
js/env-key-and-value-injection
User controlled arbitrary environment variable injection
CWE-943
JavaScript/TypeScript
js/env-value-injection
User controlled environment variable value injection
CWE-943
JavaScript/TypeScript
js/sql-injection-more-sources
Database query built from user-controlled sources with additional heuristic sources
CWE-943
JavaScript/TypeScript
js/xpath-injection-more-sources
XPath injection with additional heuristic sources
CWE-943
Python
py/sql-injection
SQL query built from user-controlled sources
CWE-943
Python
py/ldap-injection
LDAP query built from user-controlled sources
CWE-943
Python
py/xpath-injection
XPath query built from user-controlled sources
CWE-943
Python
py/nosql-injection
NoSQL Injection
CWE-943
Python
py/xslt-injection
XSLT query built from user-controlled sources
CWE-943
Ruby
rb/ldap-injection
LDAP Injection
CWE-943
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-943
Ruby
rb/sql-injection
SQL query built from user-controlled sources
CWE-943
Rust
rust/sql-injection
Database query built from user-controlled sources
CWE-943
Swift
swift/sql-injection
Database query built from user-controlled sources
CWE-943
Swift
swift/predicate-injection
Predicate built from user-controlled sources
CWE-1004
C#
cs/web/cookie-httponly-not-set
Cookie 'HttpOnly' attribute is not set to true
CWE-1004
Go
go/cookie-httponly-not-set
Cookie 'HttpOnly' attribute is not set to true
CWE-1004
Java/Kotlin
java/sensitive-cookie-not-httponly
Sensitive cookies without the HttpOnly response header set
CWE-1004
Java/Kotlin
java/tomcat-disabled-httponly
Tomcat config disables 'HttpOnly' flag (XSS risk)
CWE-1004
JavaScript/TypeScript
js/client-exposed-cookie
Sensitive server cookie exposed to the client
CWE-1004
Python
py/client-exposed-cookie
Sensitive cookie missing HttpOnly attribute
CWE-1021
JavaScript/TypeScript
js/insecure-helmet-configuration
Insecure configuration of Helmet security middleware
CWE-1022
JavaScript/TypeScript
js/unsafe-external-link
Potentially unsafe external link
CWE-1041
C/C++
cpp/call-to-function-without-wrapper
Missed opportunity to call wrapper function
CWE-1071
Java/Kotlin
java/empty-method
Empty method
CWE-1078
C/C++
cpp/comma-before-misleading-indentation
Comma before misleading indentation
CWE-1104
Java/Kotlin
java/maven/dependency-upon-bintray
Depending upon JCenter/Bintray as an artifact repository
CWE-1126
C/C++
cpp/errors-when-using-variable-declaration-inside-loop
Errors When Using Variable Declaration Inside Loop
CWE-1176
Java/Kotlin
java/string-replace-all-with-non-regex
Use of String#replaceAll with a first argument which is not a regular expression
CWE-1176
JavaScript/TypeScript
js/angular/double-compilation
Double compilation
CWE-1204
Java/Kotlin
java/static-initialization-vector
Using a static initialization vector for encryption
CWE-1204
Rust
rust/hard-coded-cryptographic-value
Hard-coded cryptographic value
CWE-1204
Swift
swift/static-initialization-vector
Static initialization vector for encryption
CWE-1236
Python
py/csv-injection
Csv Injection
CWE-1240
C/C++
cpp/crypto-primitive
Implementation of a cryptographic primitive
CWE-1275
JavaScript/TypeScript
js/samesite-none-cookie
Sensitive cookie without SameSite restrictions
CWE-1275
Python
py/samesite-none-cookie
Sensitive cookie with SameSite attribute set to None
CWE-1275
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-1333
C#
cs/redos
Denial of Service from comparison of user input against expensive regex
CWE-1333
Java/Kotlin
java/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-1333
Java/Kotlin
java/redos
Inefficient regular expression
CWE-1333
JavaScript/TypeScript
js/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-1333
JavaScript/TypeScript
js/redos
Inefficient regular expression
CWE-1333
Python
py/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-1333
Python
py/redos
Inefficient regular expression
CWE-1333
Ruby
rb/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-1333
Ruby
rb/redos
Inefficient regular expression
CWE-1333
Ruby
rb/regexp-injection
Regular expression injection
CWE-1333
Swift
swift/redos
Inefficient regular expression
CWE-1336
Java/Kotlin
java/server-side-template-injection
Server-side template injection
CWE-1395
GitHub Actions
actions/vulnerable-action
Use of a known vulnerable action
CWE-1427
Python
py/prompt-injection
Prompt injection