CWE coverage for Ruby — CodeQL query help documentation
CWE-20
Ruby
rb/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-20
Ruby
rb/incomplete-url-substring-sanitization
Incomplete URL substring sanitization
CWE-20
Ruby
rb/regex/badly-anchored-regexp
Badly anchored regular expression
CWE-20
Ruby
rb/regex/missing-regexp-anchor
Missing regular expression anchor
CWE-20
Ruby
rb/overly-large-range
Overly permissive regular expression range
CWE-20
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-20
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-20
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-22
Ruby
rb/zip-slip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-22
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-23
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-36
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-73
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-73
Ruby
rb/kernel-open
Use of
Kernel.open, IO.read or similar sinks with user-controlled input
CWE-73
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-73
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-74
Ruby
rb/ldap-injection
LDAP Injection
CWE-74
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-74
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-74
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-74
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-74
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-74
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-74
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-74
Ruby
rb/reflected-xss
Reflected server-side cross-site scripting
CWE-74
Ruby
rb/stored-xss
Stored cross-site scripting
CWE-74
Ruby
rb/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-74
Ruby
rb/sql-injection
SQL query built from user-controlled sources
CWE-74
Ruby
rb/code-injection
Code injection
CWE-74
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-74
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-74
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-74
Ruby
rb/tainted-format-string
Use of externally-controlled format string
CWE-77
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-77
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-77
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-77
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-78
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-78
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-78
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-78
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-79
Ruby
rb/reflected-xss
Reflected server-side cross-site scripting
CWE-79
Ruby
rb/stored-xss
Stored cross-site scripting
CWE-79
Ruby
rb/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-79
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-79
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-79
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-80
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-80
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-88
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-88
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-88
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-88
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-89
Ruby
rb/sql-injection
SQL query built from user-controlled sources
CWE-90
Ruby
rb/ldap-injection
LDAP Injection
CWE-91
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-94
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-94
Ruby
rb/code-injection
Code injection
CWE-94
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-95
Ruby
rb/code-injection
Code injection
CWE-99
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-116
Ruby
rb/reflected-xss
Reflected server-side cross-site scripting
CWE-116
Ruby
rb/stored-xss
Stored cross-site scripting
CWE-116
Ruby
rb/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-116
Ruby
rb/code-injection
Code injection
CWE-116
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-116
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-116
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-116
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-116
Ruby
rb/log-injection
Log injection
CWE-117
Ruby
rb/log-injection
Log injection
CWE-134
Ruby
rb/tainted-format-string
Use of externally-controlled format string
CWE-172
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-176
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-179
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-180
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-185
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-186
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-200
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-200
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-200
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-200
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-200
Ruby
rb/sensitive-get-query
Sensitive data read from GET request
CWE-203
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-208
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-209
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-259
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-284
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-284
Ruby
rb/improper-ldap-auth
Improper LDAP Authentication
CWE-284
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-284
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-284
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-284
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-285
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-285
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-287
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-287
Ruby
rb/improper-ldap-auth
Improper LDAP Authentication
CWE-287
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-290
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-295
Ruby
rb/request-without-cert-validation
Request without certificate validation
CWE-300
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-311
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-311
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-311
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-312
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-312
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-319
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-321
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-326
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-327
Ruby
rb/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-327
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-328
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-330
Ruby
rb/insecure-randomness
Insecure randomness
CWE-330
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-338
Ruby
rb/insecure-randomness
Insecure randomness
CWE-344
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-345
Ruby
rb/jwt-missing-verification
JWT missing secret or public key verification
CWE-345
Ruby
rb/csrf-protection-disabled
CSRF protection weakened or disabled
CWE-345
Ruby
rb/csrf-protection-not-enabled
CSRF protection not enabled
CWE-347
Ruby
rb/jwt-missing-verification
JWT missing secret or public key verification
CWE-352
Ruby
rb/csrf-protection-disabled
CSRF protection weakened or disabled
CWE-352
Ruby
rb/csrf-protection-not-enabled
CSRF protection not enabled
CWE-359
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-359
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-398
Ruby
rb/useless-assignment-to-local
Useless assignment to local variable
CWE-398
Ruby
rb/unused-parameter
Unused parameter
CWE-400
Ruby
rb/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-400
Ruby
rb/redos
Inefficient regular expression
CWE-400
Ruby
rb/regexp-injection
Regular expression injection
CWE-405
Ruby
rb/user-controlled-data-decompression
User-controlled file decompression
CWE-405
Ruby
rb/user-controlled-file-decompression
User-controlled file decompression
CWE-405
Ruby
rb/xxe
XML external entity expansion
CWE-409
Ruby
rb/user-controlled-data-decompression
User-controlled file decompression
CWE-409
Ruby
rb/user-controlled-file-decompression
User-controlled file decompression
CWE-409
Ruby
rb/xxe
XML external entity expansion
CWE-434
Ruby
rb/http-to-file-access
Network data written to file
CWE-441
Ruby
rb/request-forgery
Server-side request forgery
CWE-494
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-497
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-502
Ruby
rb/unsafe-unsafeyamldeserialization
Deserialization of user-controlled yaml data
CWE-502
Ruby
rb/unsafe-deserialization
Deserialization of user-controlled data
CWE-506
Ruby
rb/hardcoded-data-interpreted-as-code
Hard-coded data interpreted as code
CWE-532
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-532
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-538
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-538
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-552
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-552
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-563
Ruby
rb/useless-assignment-to-local
Useless assignment to local variable
CWE-563
Ruby
rb/unused-parameter
Unused parameter
CWE-592
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-598
Ruby
rb/sensitive-get-query
Sensitive data read from GET request
CWE-601
Ruby
rb/url-redirection
URL redirection from remote source
CWE-610
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-610
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-610
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-610
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-610
Ruby
rb/url-redirection
URL redirection from remote source
CWE-610
Ruby
rb/xxe
XML external entity expansion
CWE-610
Ruby
rb/request-forgery
Server-side request forgery
CWE-611
Ruby
rb/xxe
XML external entity expansion
CWE-642
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-642
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-642
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-642
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-643
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-657
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-664
Ruby
rb/user-controlled-data-decompression
User-controlled file decompression
CWE-664
Ruby
rb/zip-slip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-664
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-664
Ruby
rb/unsafe-unsafeyamldeserialization
Deserialization of user-controlled yaml data
CWE-664
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-664
Ruby
rb/user-controlled-file-decompression
User-controlled file decompression
CWE-664
Ruby
rb/improper-ldap-auth
Improper LDAP Authentication
CWE-664
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-664
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-664
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-664
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-664
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-664
Ruby
rb/code-injection
Code injection
CWE-664
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-664
Ruby
rb/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-664
Ruby
rb/redos
Inefficient regular expression
CWE-664
Ruby
rb/regexp-injection
Regular expression injection
CWE-664
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-664
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-664
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-664
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-664
Ruby
rb/unsafe-deserialization
Deserialization of user-controlled data
CWE-664
Ruby
rb/sensitive-get-query
Sensitive data read from GET request
CWE-664
Ruby
rb/url-redirection
URL redirection from remote source
CWE-664
Ruby
rb/xxe
XML external entity expansion
CWE-664
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-664
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-664
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-664
Ruby
rb/insecure-download
Download of sensitive file through insecure connection
CWE-664
Ruby
rb/http-to-file-access
Network data written to file
CWE-664
Ruby
rb/insecure-mass-assignment
Insecure Mass Assignment
CWE-664
Ruby
rb/request-forgery
Server-side request forgery
CWE-668
Ruby
rb/zip-slip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-668
Ruby
rb/unsafe-hmac-comparison
Unsafe HMAC Comparison
CWE-668
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-668
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-668
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-668
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-668
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-668
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-668
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-668
Ruby
rb/sensitive-get-query
Sensitive data read from GET request
CWE-668
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-668
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-669
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-669
Ruby
rb/xxe
XML external entity expansion
CWE-669
Ruby
rb/insecure-download
Download of sensitive file through insecure connection
CWE-669
Ruby
rb/http-to-file-access
Network data written to file
CWE-671
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-674
Ruby
rb/xxe
XML external entity expansion
CWE-691
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-691
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-691
Ruby
rb/code-injection
Code injection
CWE-691
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-691
Ruby
rb/xxe
XML external entity expansion
CWE-693
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-693
Ruby
rb/jwt-missing-verification
JWT missing secret or public key verification
CWE-693
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-693
Ruby
rb/improper-ldap-auth
Improper LDAP Authentication
CWE-693
Ruby
rb/incomplete-hostname-regexp
Incomplete regular expression for hostnames
CWE-693
Ruby
rb/incomplete-url-substring-sanitization
Incomplete URL substring sanitization
CWE-693
Ruby
rb/regex/badly-anchored-regexp
Badly anchored regular expression
CWE-693
Ruby
rb/regex/missing-regexp-anchor
Missing regular expression anchor
CWE-693
Ruby
rb/overly-large-range
Overly permissive regular expression range
CWE-693
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-693
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-693
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-693
Ruby
rb/request-without-cert-validation
Request without certificate validation
CWE-693
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-693
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-693
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-693
Ruby
rb/weak-cryptographic-algorithm
Use of a broken or weak cryptographic algorithm
CWE-693
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-693
Ruby
rb/csrf-protection-disabled
CSRF protection weakened or disabled
CWE-693
Ruby
rb/csrf-protection-not-enabled
CSRF protection not enabled
CWE-693
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-693
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-693
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-696
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-697
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-703
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-706
Ruby
rb/zip-slip
Arbitrary file access during archive extraction ("Zip Slip")
CWE-706
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-706
Ruby
rb/xxe
XML external entity expansion
CWE-707
Ruby
rb/unicode-bypass-validation
Bypass Logical Validation Using Unicode Characters
CWE-707
Ruby
rb/ldap-injection
LDAP Injection
CWE-707
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-707
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-707
Ruby
rb/path-injection
Uncontrolled data used in path expression
CWE-707
Ruby
rb/command-line-injection
Uncontrolled command line
CWE-707
Ruby
rb/kernel-open
Use of Kernel.open, IO.read or similar sinks with user-controlled input
CWE-707
Ruby
rb/non-constant-kernel-open
Use of Kernel.open or IO.read or similar sinks with a non-constant value
CWE-707
Ruby
rb/shell-command-constructed-from-input
Unsafe shell command constructed from library input
CWE-707
Ruby
rb/reflected-xss
Reflected server-side cross-site scripting
CWE-707
Ruby
rb/stored-xss
Stored cross-site scripting
CWE-707
Ruby
rb/html-constructed-from-input
Unsafe HTML constructed from library input
CWE-707
Ruby
rb/sql-injection
SQL query built from user-controlled sources
CWE-707
Ruby
rb/code-injection
Code injection
CWE-707
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-707
Ruby
rb/bad-tag-filter
Bad HTML filtering regexp
CWE-707
Ruby
rb/incomplete-multi-character-sanitization
Incomplete multi-character sanitization
CWE-707
Ruby
rb/incomplete-sanitization
Incomplete string escaping or encoding
CWE-707
Ruby
rb/log-injection
Log injection
CWE-707
Ruby
rb/tainted-format-string
Use of externally-controlled format string
CWE-710
Ruby
rb/hardcoded-data-interpreted-as-code
Hard-coded data interpreted as code
CWE-710
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-710
Ruby
rb/http-to-file-access
Network data written to file
CWE-710
Ruby
rb/useless-assignment-to-local
Useless assignment to local variable
CWE-710
Ruby
rb/unused-parameter
Unused parameter
CWE-732
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-732
Ruby
rb/overly-permissive-file
Overly permissive file permissions
CWE-755
Ruby
rb/stack-trace-exposure
Information exposure through an exception
CWE-776
Ruby
rb/xxe
XML external entity expansion
CWE-798
Ruby
rb/hardcoded-credentials
Hard-coded credentials
CWE-807
Ruby
rb/user-controlled-bypass
User-controlled bypass of security check
CWE-827
Ruby
rb/xxe
XML external entity expansion
CWE-829
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-829
Ruby
rb/xxe
XML external entity expansion
CWE-829
Ruby
rb/insecure-download
Download of sensitive file through insecure connection
CWE-834
Ruby
rb/xxe
XML external entity expansion
CWE-912
Ruby
rb/hardcoded-data-interpreted-as-code
Hard-coded data interpreted as code
CWE-912
Ruby
rb/http-to-file-access
Network data written to file
CWE-913
Ruby
rb/unsafe-unsafeyamldeserialization
Deserialization of user-controlled yaml data
CWE-913
Ruby
rb/server-side-template-injection
Server-side template injection
CWE-913
Ruby
rb/code-injection
Code injection
CWE-913
Ruby
rb/unsafe-code-construction
Unsafe code constructed from library input
CWE-913
Ruby
rb/unsafe-deserialization
Deserialization of user-controlled data
CWE-913
Ruby
rb/insecure-mass-assignment
Insecure Mass Assignment
CWE-915
Ruby
rb/insecure-mass-assignment
Insecure Mass Assignment
CWE-916
Ruby
rb/weak-sensitive-data-hashing
Use of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-918
Ruby
rb/request-forgery
Server-side request forgery
CWE-922
Ruby
rb/clear-text-logging-sensitive-data
Clear-text logging of sensitive information
CWE-922
Ruby
rb/clear-text-storage-sensitive-data
Clear-text storage of sensitive information
CWE-923
Ruby
rb/insecure-dependency
Dependency download using unencrypted communication channel
CWE-943
Ruby
rb/ldap-injection
LDAP Injection
CWE-943
Ruby
rb/xpath-injection
XPath query built from user-controlled sources
CWE-943
Ruby
rb/sql-injection
SQL query built from user-controlled sources
CWE-1275
Ruby
rb/weak-cookie-configuration
Weak cookie configuration
CWE-1333
Ruby
rb/polynomial-redos
Polynomial regular expression used on uncontrolled data
CWE-1333
Ruby
rb/redos
Inefficient regular expression
CWE-1333
Ruby
rb/regexp-injection
Regular expression injection