Movatterモバイル変換


[0]ホーム

URL:


CodeQL documentation
CodeQL resources

CWE coverage for Ruby

An overview of CWE coverage for Ruby in the latest release of CodeQL.

Overview

CWELanguageQuery idQuery name
CWE-20Rubyrb/incomplete-hostname-regexpIncomplete regular expression for hostnames
CWE-20Rubyrb/incomplete-url-substring-sanitizationIncomplete URL substring sanitization
CWE-20Rubyrb/regex/badly-anchored-regexpBadly anchored regular expression
CWE-20Rubyrb/regex/missing-regexp-anchorMissing regular expression anchor
CWE-20Rubyrb/overly-large-rangeOverly permissive regular expression range
CWE-20Rubyrb/bad-tag-filterBad HTML filtering regexp
CWE-20Rubyrb/incomplete-multi-character-sanitizationIncomplete multi-character sanitization
CWE-20Rubyrb/incomplete-sanitizationIncomplete string escaping or encoding
CWE-22Rubyrb/zip-slipArbitrary file access during archive extraction ("Zip Slip")
CWE-22Rubyrb/path-injectionUncontrolled data used in path expression
CWE-23Rubyrb/path-injectionUncontrolled data used in path expression
CWE-36Rubyrb/path-injectionUncontrolled data used in path expression
CWE-73Rubyrb/path-injectionUncontrolled data used in path expression
CWE-73Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-73Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-73Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-74Rubyrb/ldap-injectionLDAP Injection
CWE-74Rubyrb/server-side-template-injectionServer-side template injection
CWE-74Rubyrb/xpath-injectionXPath query built from user-controlled sources
CWE-74Rubyrb/path-injectionUncontrolled data used in path expression
CWE-74Rubyrb/command-line-injectionUncontrolled command line
CWE-74Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-74Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-74Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-74Rubyrb/reflected-xssReflected server-side cross-site scripting
CWE-74Rubyrb/stored-xssStored cross-site scripting
CWE-74Rubyrb/html-constructed-from-inputUnsafe HTML constructed from library input
CWE-74Rubyrb/sql-injectionSQL query built from user-controlled sources
CWE-74Rubyrb/code-injectionCode injection
CWE-74Rubyrb/unsafe-code-constructionUnsafe code constructed from library input
CWE-74Rubyrb/incomplete-multi-character-sanitizationIncomplete multi-character sanitization
CWE-74Rubyrb/incomplete-sanitizationIncomplete string escaping or encoding
CWE-74Rubyrb/tainted-format-stringUse of externally-controlled format string
CWE-77Rubyrb/command-line-injectionUncontrolled command line
CWE-77Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-77Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-77Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-78Rubyrb/command-line-injectionUncontrolled command line
CWE-78Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-78Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-78Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-79Rubyrb/reflected-xssReflected server-side cross-site scripting
CWE-79Rubyrb/stored-xssStored cross-site scripting
CWE-79Rubyrb/html-constructed-from-inputUnsafe HTML constructed from library input
CWE-79Rubyrb/unsafe-code-constructionUnsafe code constructed from library input
CWE-79Rubyrb/incomplete-multi-character-sanitizationIncomplete multi-character sanitization
CWE-79Rubyrb/incomplete-sanitizationIncomplete string escaping or encoding
CWE-80Rubyrb/incomplete-multi-character-sanitizationIncomplete multi-character sanitization
CWE-80Rubyrb/incomplete-sanitizationIncomplete string escaping or encoding
CWE-88Rubyrb/command-line-injectionUncontrolled command line
CWE-88Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-88Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-88Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-89Rubyrb/sql-injectionSQL query built from user-controlled sources
CWE-90Rubyrb/ldap-injectionLDAP Injection
CWE-91Rubyrb/xpath-injectionXPath query built from user-controlled sources
CWE-94Rubyrb/server-side-template-injectionServer-side template injection
CWE-94Rubyrb/code-injectionCode injection
CWE-94Rubyrb/unsafe-code-constructionUnsafe code constructed from library input
CWE-95Rubyrb/code-injectionCode injection
CWE-99Rubyrb/path-injectionUncontrolled data used in path expression
CWE-116Rubyrb/reflected-xssReflected server-side cross-site scripting
CWE-116Rubyrb/stored-xssStored cross-site scripting
CWE-116Rubyrb/html-constructed-from-inputUnsafe HTML constructed from library input
CWE-116Rubyrb/code-injectionCode injection
CWE-116Rubyrb/unsafe-code-constructionUnsafe code constructed from library input
CWE-116Rubyrb/bad-tag-filterBad HTML filtering regexp
CWE-116Rubyrb/incomplete-multi-character-sanitizationIncomplete multi-character sanitization
CWE-116Rubyrb/incomplete-sanitizationIncomplete string escaping or encoding
CWE-116Rubyrb/log-injectionLog injection
CWE-117Rubyrb/log-injectionLog injection
CWE-134Rubyrb/tainted-format-stringUse of externally-controlled format string
CWE-172Rubyrb/unicode-bypass-validationBypass Logical Validation Using Unicode Characters
CWE-176Rubyrb/unicode-bypass-validationBypass Logical Validation Using Unicode Characters
CWE-179Rubyrb/unicode-bypass-validationBypass Logical Validation Using Unicode Characters
CWE-180Rubyrb/unicode-bypass-validationBypass Logical Validation Using Unicode Characters
CWE-185Rubyrb/bad-tag-filterBad HTML filtering regexp
CWE-186Rubyrb/bad-tag-filterBad HTML filtering regexp
CWE-200Rubyrb/unsafe-hmac-comparisonUnsafe HMAC Comparison
CWE-200Rubyrb/stack-trace-exposureInformation exposure through an exception
CWE-200Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-200Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-200Rubyrb/sensitive-get-querySensitive data read from GET request
CWE-203Rubyrb/unsafe-hmac-comparisonUnsafe HMAC Comparison
CWE-208Rubyrb/unsafe-hmac-comparisonUnsafe HMAC Comparison
CWE-209Rubyrb/stack-trace-exposureInformation exposure through an exception
CWE-259Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-284Rubyrb/user-controlled-bypassUser-controlled bypass of security check
CWE-284Rubyrb/improper-ldap-authImproper LDAP Authentication
CWE-284Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-284Rubyrb/weak-cookie-configurationWeak cookie configuration
CWE-284Rubyrb/overly-permissive-fileOverly permissive file permissions
CWE-284Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-285Rubyrb/weak-cookie-configurationWeak cookie configuration
CWE-285Rubyrb/overly-permissive-fileOverly permissive file permissions
CWE-287Rubyrb/user-controlled-bypassUser-controlled bypass of security check
CWE-287Rubyrb/improper-ldap-authImproper LDAP Authentication
CWE-287Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-290Rubyrb/user-controlled-bypassUser-controlled bypass of security check
CWE-295Rubyrb/request-without-cert-validationRequest without certificate validation
CWE-300Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-311Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-311Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-311Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-312Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-312Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-319Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-321Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-326Rubyrb/weak-sensitive-data-hashingUse of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-327Rubyrb/weak-cryptographic-algorithmUse of a broken or weak cryptographic algorithm
CWE-327Rubyrb/weak-sensitive-data-hashingUse of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-328Rubyrb/weak-sensitive-data-hashingUse of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-330Rubyrb/insecure-randomnessInsecure randomness
CWE-330Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-338Rubyrb/insecure-randomnessInsecure randomness
CWE-344Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-345Rubyrb/jwt-missing-verificationJWT missing secret or public key verification
CWE-345Rubyrb/csrf-protection-disabledCSRF protection weakened or disabled
CWE-345Rubyrb/csrf-protection-not-enabledCSRF protection not enabled
CWE-347Rubyrb/jwt-missing-verificationJWT missing secret or public key verification
CWE-352Rubyrb/csrf-protection-disabledCSRF protection weakened or disabled
CWE-352Rubyrb/csrf-protection-not-enabledCSRF protection not enabled
CWE-359Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-359Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-398Rubyrb/useless-assignment-to-localUseless assignment to local variable
CWE-398Rubyrb/unused-parameterUnused parameter.
CWE-400Rubyrb/polynomial-redosPolynomial regular expression used on uncontrolled data
CWE-400Rubyrb/redosInefficient regular expression
CWE-400Rubyrb/regexp-injectionRegular expression injection
CWE-405Rubyrb/user-controlled-data-decompressionUser-controlled file decompression
CWE-405Rubyrb/user-controlled-file-decompressionUser-controlled file decompression
CWE-405Rubyrb/xxeXML external entity expansion
CWE-409Rubyrb/user-controlled-data-decompressionUser-controlled file decompression
CWE-409Rubyrb/user-controlled-file-decompressionUser-controlled file decompression
CWE-409Rubyrb/xxeXML external entity expansion
CWE-434Rubyrb/http-to-file-accessNetwork data written to file
CWE-441Rubyrb/request-forgeryServer-side request forgery
CWE-494Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-497Rubyrb/stack-trace-exposureInformation exposure through an exception
CWE-502Rubyrb/unsafe-unsafeyamldeserializationDeserialization of user-controlled yaml data
CWE-502Rubyrb/unsafe-deserializationDeserialization of user-controlled data
CWE-506Rubyrb/hardcoded-data-interpreted-as-codeHard-coded data interpreted as code
CWE-532Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-532Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-538Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-538Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-552Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-552Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-563Rubyrb/useless-assignment-to-localUseless assignment to local variable
CWE-563Rubyrb/unused-parameterUnused parameter.
CWE-592Rubyrb/user-controlled-bypassUser-controlled bypass of security check
CWE-598Rubyrb/sensitive-get-querySensitive data read from GET request
CWE-601Rubyrb/url-redirectionURL redirection from remote source
CWE-610Rubyrb/path-injectionUncontrolled data used in path expression
CWE-610Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-610Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-610Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-610Rubyrb/url-redirectionURL redirection from remote source
CWE-610Rubyrb/xxeXML external entity expansion
CWE-610Rubyrb/request-forgeryServer-side request forgery
CWE-611Rubyrb/xxeXML external entity expansion
CWE-642Rubyrb/path-injectionUncontrolled data used in path expression
CWE-642Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-642Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-642Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-643Rubyrb/xpath-injectionXPath query built from user-controlled sources
CWE-657Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-664Rubyrb/user-controlled-data-decompressionUser-controlled file decompression
CWE-664Rubyrb/zip-slipArbitrary file access during archive extraction ("Zip Slip")
CWE-664Rubyrb/unsafe-hmac-comparisonUnsafe HMAC Comparison
CWE-664Rubyrb/unsafe-unsafeyamldeserializationDeserialization of user-controlled yaml data
CWE-664Rubyrb/user-controlled-bypassUser-controlled bypass of security check
CWE-664Rubyrb/user-controlled-file-decompressionUser-controlled file decompression
CWE-664Rubyrb/improper-ldap-authImproper LDAP Authentication
CWE-664Rubyrb/server-side-template-injectionServer-side template injection
CWE-664Rubyrb/path-injectionUncontrolled data used in path expression
CWE-664Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-664Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-664Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-664Rubyrb/code-injectionCode injection
CWE-664Rubyrb/unsafe-code-constructionUnsafe code constructed from library input
CWE-664Rubyrb/polynomial-redosPolynomial regular expression used on uncontrolled data
CWE-664Rubyrb/redosInefficient regular expression
CWE-664Rubyrb/regexp-injectionRegular expression injection
CWE-664Rubyrb/stack-trace-exposureInformation exposure through an exception
CWE-664Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-664Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-664Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-664Rubyrb/unsafe-deserializationDeserialization of user-controlled data
CWE-664Rubyrb/sensitive-get-querySensitive data read from GET request
CWE-664Rubyrb/url-redirectionURL redirection from remote source
CWE-664Rubyrb/xxeXML external entity expansion
CWE-664Rubyrb/weak-cookie-configurationWeak cookie configuration
CWE-664Rubyrb/overly-permissive-fileOverly permissive file permissions
CWE-664Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-664Rubyrb/insecure-downloadDownload of sensitive file through insecure connection
CWE-664Rubyrb/http-to-file-accessNetwork data written to file
CWE-664Rubyrb/insecure-mass-assignmentInsecure Mass Assignment
CWE-664Rubyrb/request-forgeryServer-side request forgery
CWE-668Rubyrb/zip-slipArbitrary file access during archive extraction ("Zip Slip")
CWE-668Rubyrb/unsafe-hmac-comparisonUnsafe HMAC Comparison
CWE-668Rubyrb/path-injectionUncontrolled data used in path expression
CWE-668Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-668Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-668Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-668Rubyrb/stack-trace-exposureInformation exposure through an exception
CWE-668Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-668Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-668Rubyrb/sensitive-get-querySensitive data read from GET request
CWE-668Rubyrb/weak-cookie-configurationWeak cookie configuration
CWE-668Rubyrb/overly-permissive-fileOverly permissive file permissions
CWE-669Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-669Rubyrb/xxeXML external entity expansion
CWE-669Rubyrb/insecure-downloadDownload of sensitive file through insecure connection
CWE-669Rubyrb/http-to-file-accessNetwork data written to file
CWE-671Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-674Rubyrb/xxeXML external entity expansion
CWE-691Rubyrb/unicode-bypass-validationBypass Logical Validation Using Unicode Characters
CWE-691Rubyrb/server-side-template-injectionServer-side template injection
CWE-691Rubyrb/code-injectionCode injection
CWE-691Rubyrb/unsafe-code-constructionUnsafe code constructed from library input
CWE-691Rubyrb/xxeXML external entity expansion
CWE-693Rubyrb/unicode-bypass-validationBypass Logical Validation Using Unicode Characters
CWE-693Rubyrb/jwt-missing-verificationJWT missing secret or public key verification
CWE-693Rubyrb/user-controlled-bypassUser-controlled bypass of security check
CWE-693Rubyrb/improper-ldap-authImproper LDAP Authentication
CWE-693Rubyrb/incomplete-hostname-regexpIncomplete regular expression for hostnames
CWE-693Rubyrb/incomplete-url-substring-sanitizationIncomplete URL substring sanitization
CWE-693Rubyrb/regex/badly-anchored-regexpBadly anchored regular expression
CWE-693Rubyrb/regex/missing-regexp-anchorMissing regular expression anchor
CWE-693Rubyrb/overly-large-rangeOverly permissive regular expression range
CWE-693Rubyrb/bad-tag-filterBad HTML filtering regexp
CWE-693Rubyrb/incomplete-multi-character-sanitizationIncomplete multi-character sanitization
CWE-693Rubyrb/incomplete-sanitizationIncomplete string escaping or encoding
CWE-693Rubyrb/request-without-cert-validationRequest without certificate validation
CWE-693Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-693Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-693Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-693Rubyrb/weak-cryptographic-algorithmUse of a broken or weak cryptographic algorithm
CWE-693Rubyrb/weak-sensitive-data-hashingUse of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-693Rubyrb/csrf-protection-disabledCSRF protection weakened or disabled
CWE-693Rubyrb/csrf-protection-not-enabledCSRF protection not enabled
CWE-693Rubyrb/weak-cookie-configurationWeak cookie configuration
CWE-693Rubyrb/overly-permissive-fileOverly permissive file permissions
CWE-693Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-696Rubyrb/unicode-bypass-validationBypass Logical Validation Using Unicode Characters
CWE-697Rubyrb/bad-tag-filterBad HTML filtering regexp
CWE-703Rubyrb/stack-trace-exposureInformation exposure through an exception
CWE-706Rubyrb/zip-slipArbitrary file access during archive extraction ("Zip Slip")
CWE-706Rubyrb/path-injectionUncontrolled data used in path expression
CWE-706Rubyrb/xxeXML external entity expansion
CWE-707Rubyrb/unicode-bypass-validationBypass Logical Validation Using Unicode Characters
CWE-707Rubyrb/ldap-injectionLDAP Injection
CWE-707Rubyrb/server-side-template-injectionServer-side template injection
CWE-707Rubyrb/xpath-injectionXPath query built from user-controlled sources
CWE-707Rubyrb/path-injectionUncontrolled data used in path expression
CWE-707Rubyrb/command-line-injectionUncontrolled command line
CWE-707Rubyrb/kernel-openUse ofKernel.open,IO.read or similar sinks with user-controlled input
CWE-707Rubyrb/non-constant-kernel-openUse ofKernel.open orIO.read or similar sinks with a non-constant value
CWE-707Rubyrb/shell-command-constructed-from-inputUnsafe shell command constructed from library input
CWE-707Rubyrb/reflected-xssReflected server-side cross-site scripting
CWE-707Rubyrb/stored-xssStored cross-site scripting
CWE-707Rubyrb/html-constructed-from-inputUnsafe HTML constructed from library input
CWE-707Rubyrb/sql-injectionSQL query built from user-controlled sources
CWE-707Rubyrb/code-injectionCode injection
CWE-707Rubyrb/unsafe-code-constructionUnsafe code constructed from library input
CWE-707Rubyrb/bad-tag-filterBad HTML filtering regexp
CWE-707Rubyrb/incomplete-multi-character-sanitizationIncomplete multi-character sanitization
CWE-707Rubyrb/incomplete-sanitizationIncomplete string escaping or encoding
CWE-707Rubyrb/log-injectionLog injection
CWE-707Rubyrb/tainted-format-stringUse of externally-controlled format string
CWE-710Rubyrb/hardcoded-data-interpreted-as-codeHard-coded data interpreted as code
CWE-710Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-710Rubyrb/http-to-file-accessNetwork data written to file
CWE-710Rubyrb/useless-assignment-to-localUseless assignment to local variable
CWE-710Rubyrb/unused-parameterUnused parameter.
CWE-732Rubyrb/weak-cookie-configurationWeak cookie configuration
CWE-732Rubyrb/overly-permissive-fileOverly permissive file permissions
CWE-755Rubyrb/stack-trace-exposureInformation exposure through an exception
CWE-776Rubyrb/xxeXML external entity expansion
CWE-798Rubyrb/hardcoded-credentialsHard-coded credentials
CWE-807Rubyrb/user-controlled-bypassUser-controlled bypass of security check
CWE-827Rubyrb/xxeXML external entity expansion
CWE-829Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-829Rubyrb/xxeXML external entity expansion
CWE-829Rubyrb/insecure-downloadDownload of sensitive file through insecure connection
CWE-834Rubyrb/xxeXML external entity expansion
CWE-912Rubyrb/hardcoded-data-interpreted-as-codeHard-coded data interpreted as code
CWE-912Rubyrb/http-to-file-accessNetwork data written to file
CWE-913Rubyrb/unsafe-unsafeyamldeserializationDeserialization of user-controlled yaml data
CWE-913Rubyrb/server-side-template-injectionServer-side template injection
CWE-913Rubyrb/code-injectionCode injection
CWE-913Rubyrb/unsafe-code-constructionUnsafe code constructed from library input
CWE-913Rubyrb/unsafe-deserializationDeserialization of user-controlled data
CWE-913Rubyrb/insecure-mass-assignmentInsecure Mass Assignment
CWE-915Rubyrb/insecure-mass-assignmentInsecure Mass Assignment
CWE-916Rubyrb/weak-sensitive-data-hashingUse of a broken or weak cryptographic hashing algorithm on sensitive data
CWE-918Rubyrb/request-forgeryServer-side request forgery
CWE-922Rubyrb/clear-text-logging-sensitive-dataClear-text logging of sensitive information
CWE-922Rubyrb/clear-text-storage-sensitive-dataClear-text storage of sensitive information
CWE-923Rubyrb/insecure-dependencyDependency download using unencrypted communication channel
CWE-943Rubyrb/ldap-injectionLDAP Injection
CWE-943Rubyrb/xpath-injectionXPath query built from user-controlled sources
CWE-943Rubyrb/sql-injectionSQL query built from user-controlled sources
CWE-1275Rubyrb/weak-cookie-configurationWeak cookie configuration
CWE-1333Rubyrb/polynomial-redosPolynomial regular expression used on uncontrolled data
CWE-1333Rubyrb/redosInefficient regular expression
CWE-1333Rubyrb/regexp-injectionRegular expression injection

[8]ページ先頭

©2009-2025 Movatter.jp