Target URL is tainted by user input
|
High |
Step |
Data Validation |
CWE-22
CWE-233
CWE-918
CWE-20
|
Unsafe regular expression
|
High |
Step |
Data Validation |
CWE-1333
|
Unsafe variable is used to define host
|
High |
Step |
Data Validation |
CWE-20
|
Use of weak hash algorithms
|
High |
AssignMessage
HMAC
JavaScript |
Secure Configuration |
CWE-327
|
User-controlled data in ServiceCallout
|
High |
Step |
Data Validation |
CWE-233
CWE-20
|
Missing API versioning
|
Info |
Proxy |
Secure Configuration |
CWE-710
|
Policy is not linked to step
|
Info |
Proxy |
Code Quality |
CWE-561
|
Resource is not linked to a policy
|
Info |
Proxy |
Code Quality |
CWE-561
|
Unused flow variables
|
Info |
Step |
Code Quality |
CWE-563
|