Target URL is tainted by user input
|
High |
Step |
Data Validation |
CWE-22
CWE-233
CWE-918
CWE-20
|
Unsafe regular expression
|
High |
Step |
Data Validation |
CWE-1333
|
Unsafe variable is used to define host
|
High |
Step |
Data Validation |
CWE-20
|
Use of weak hash algorithms
|
High |
AssignMessage
HMAC
JavaScript |
Secure Configuration |
CWE-327
|
User-controlled data in ServiceCallout
|
High |
Step |
Data Validation |
CWE-233
CWE-20
|
Cache lookup variable is overwritten
|
Low |
Step |
Code Quality |
CWE-472
|
Missing security headers
|
Low |
Proxy |
Secure Configuration |
CWE-523
|
No mask configuration for the proxy
|
Low |
Proxy |
Code Quality |
|
Overcomplicated or malformed condition
|
Low |
Step
RouteRule
Flow |
Code Quality |
CWE-570
CWE-571
|
Policy errors are not caught
|
Low |
Step |
Error Handling |
CWE-390
|
Sharedflow has not beeing scanned by CodeSent
|
Low |
FlowCallout |
Code Quality |
|
Step operates undefined flow variables
|
Low |
Step |
Code Quality |
CWE-457
|