Name Severity Scopes Tags Links
Target URL is tainted by user input High Step Data Validation CWE-22 CWE-233 CWE-918 CWE-20
Unsafe regular expression High Step Data Validation CWE-1333
Unsafe variable is used to define host High Step Data Validation CWE-20
Use of weak hash algorithms High AssignMessage HMAC JavaScript Secure Configuration CWE-327
User-controlled data in ServiceCallout High Step Data Validation CWE-233 CWE-20
AccessControl allows all IPs Medium AccessControl Data Validation CWE-290
Condition has undefined variables Medium Step RouteRule Flow Code Quality CWE-570 CWE-571
Error flow variable is set but not checked in request phase Medium Step Error Handling CWE-390
Flow accepts requests with any method Medium Flow Data Validation CWE-749
Flow doesn't limit HTTP methods correctly Medium Flow Data Validation CWE-749
Insecure JSONThreatProtection policy Medium JSONThreatProtection Code Quality Data Validation CWE-770 CWE-20
Insecure token expiration configuration Medium OAuthV2 Secure Configuration CWE-613
Lack of DefaultFaultRule Medium Target Proxy Error Handling CWE-390
Masked flow variable is written into unmasked one Medium Step Data at Rest CWE-532
MatchesPath is applied to a static parameter Medium Target Proxy Code Quality Data Validation CWE-20
No SpikeArrest policy is applied Medium Proxy Code Quality DoS Protection CWE-770
Private flow variable is written into public one Medium Step Data at Rest CWE-532
ServiceCallout policy uses default message object as a request Medium ServiceCallout Code Quality CWE-200
ServiceCallout policy uses default message object as a response Medium ServiceCallout Code Quality CWE-200
Unreachable Flow Medium Proxy Code Quality CWE-561