Use of weak hash algorithms
|
High |
AssignMessage
HMAC
JavaScript |
Secure Configuration |
CWE-327
|
Flow accepts confidential data as URL parameters
|
High |
Flow
PreFlow |
Data in Transit |
CWE-598
|
Bypassing AccessControl policy via True-Client-IP header
|
Critical |
AccessControl |
Data Validation |
CWE-290
|
AssignMessage request parameters pollution
|
High |
AssignMessage |
Data Validation |
CWE-20
|
AccessControl allows all IPs
|
Medium |
AccessControl |
Data Validation |
CWE-290
|