|
101 | 101 | "type": "VULNERABILITY", |
102 | 102 | "url": "https://find-sec-bugs.github.io/bugs.htm#CUSTOM_MESSAGE_DIGEST" |
103 | 103 | }, |
| 104 | + { |
| 105 | + "key": "DANGEROUS_PERMISSION_COMBINATION", |
| 106 | + "name": "Dangerous combination of permissions granted", |
| 107 | + "type": "VULNERABILITY", |
| 108 | + "url": "https://find-sec-bugs.github.io/bugs.htm#DANGEROUS_PERMISSION_COMBINATION" |
| 109 | + }, |
104 | 110 | { |
105 | 111 | "key": "DEFAULT_HTTP_CLIENT", |
106 | 112 | "name": "DefaultHttpClient with default constructor is not compatible with TLS 1.2", |
|
131 | 137 | "type": "VULNERABILITY", |
132 | 138 | "url": "https://find-sec-bugs.github.io/bugs.htm#EL_INJECTION" |
133 | 139 | }, |
| 140 | + { |
| 141 | + "key": "ENTITY_LEAK", |
| 142 | + "name": "Unexpected property leak", |
| 143 | + "type": "VULNERABILITY", |
| 144 | + "url": "https://find-sec-bugs.github.io/bugs.htm#ENTITY_LEAK" |
| 145 | + }, |
| 146 | + { |
| 147 | + "key": "ENTITY_MASS_ASSIGNMENT", |
| 148 | + "name": "Mass assignment", |
| 149 | + "type": "VULNERABILITY", |
| 150 | + "url": "https://find-sec-bugs.github.io/bugs.htm#ENTITY_MASS_ASSIGNMENT" |
| 151 | + }, |
134 | 152 | { |
135 | 153 | "key": "ESAPI_ENCRYPTOR", |
136 | 154 | "name": "Use of ESAPI Encryptor", |
|
155 | 173 | "type": "VULNERABILITY", |
156 | 174 | "url": "https://find-sec-bugs.github.io/bugs.htm#FORMAT_STRING_MANIPULATION" |
157 | 175 | }, |
| 176 | + { |
| 177 | + "key": "GROOVY_SHELL", |
| 178 | + "name": "Potential code injection when using GroovyShell", |
| 179 | + "type": "VULNERABILITY", |
| 180 | + "url": "https://find-sec-bugs.github.io/bugs.htm#GROOVY_SHELL" |
| 181 | + }, |
158 | 182 | { |
159 | 183 | "key": "HARD_CODE_KEY", |
160 | | - "name": "Hard Coded Key", |
| 184 | + "name": "Hard coded key", |
161 | 185 | "type": "VULNERABILITY", |
162 | 186 | "url": "https://find-sec-bugs.github.io/bugs.htm#HARD_CODE_KEY" |
163 | 187 | }, |
164 | 188 | { |
165 | 189 | "key": "HARD_CODE_PASSWORD", |
166 | | - "name": "Hard Coded Password", |
| 190 | + "name": "Hard coded password", |
167 | 191 | "type": "VULNERABILITY", |
168 | 192 | "url": "https://find-sec-bugs.github.io/bugs.htm#HARD_CODE_PASSWORD" |
169 | 193 | }, |
|
191 | 215 | "type": "VULNERABILITY", |
192 | 216 | "url": "https://find-sec-bugs.github.io/bugs.htm#HTTP_RESPONSE_SPLITTING" |
193 | 217 | }, |
| 218 | + { |
| 219 | + "key": "IMPROPER_UNICODE", |
| 220 | + "name": "Improper handling of Unicode transformations", |
| 221 | + "type": "VULNERABILITY", |
| 222 | + "url": "https://find-sec-bugs.github.io/bugs.htm#IMPROPER_UNICODE" |
| 223 | + }, |
194 | 224 | { |
195 | 225 | "key": "INFORMATION_EXPOSURE_THROUGH_AN_ERROR_MESSAGE", |
196 | 226 | "name": "Information Exposure Through An Error Message", |
|
247 | 277 | }, |
248 | 278 | { |
249 | 279 | "key": "JSP_XSLT", |
250 | | - "name": "A malicious XSLT could be provided", |
| 280 | + "name": "A malicious XSLT could be provided to the JSP tag", |
251 | 281 | "type": "VULNERABILITY", |
252 | 282 | "url": "https://find-sec-bugs.github.io/bugs.htm#JSP_XSLT" |
253 | 283 | }, |
|
275 | 305 | "type": "VULNERABILITY", |
276 | 306 | "url": "https://find-sec-bugs.github.io/bugs.htm#MALICIOUS_XSLT" |
277 | 307 | }, |
| 308 | + { |
| 309 | + "key": "MODIFICATION_AFTER_VALIDATION", |
| 310 | + "name": "String is modified after validation and not before it", |
| 311 | + "type": "VULNERABILITY", |
| 312 | + "url": "https://find-sec-bugs.github.io/bugs.htm#MODIFICATION_AFTER_VALIDATION" |
| 313 | + }, |
| 314 | + { |
| 315 | + "key": "NORMALIZATION_AFTER_VALIDATION", |
| 316 | + "name": "String is normalzied after validation and not before it", |
| 317 | + "type": "VULNERABILITY", |
| 318 | + "url": "https://find-sec-bugs.github.io/bugs.htm#NORMALIZATION_AFTER_VALIDATION" |
| 319 | + }, |
278 | 320 | { |
279 | 321 | "key": "NULL_CIPHER", |
280 | 322 | "name": "NullCipher is insecure", |
|
293 | 335 | "type": "VULNERABILITY", |
294 | 336 | "url": "https://find-sec-bugs.github.io/bugs.htm#OGNL_INJECTION" |
295 | 337 | }, |
| 338 | + { |
| 339 | + "key": "OVERLY_PERMISSIVE_FILE_PERMISSION", |
| 340 | + "name": "Overly permissive file permission", |
| 341 | + "type": "VULNERABILITY", |
| 342 | + "url": "https://find-sec-bugs.github.io/bugs.htm#OVERLY_PERMISSIVE_FILE_PERMISSION" |
| 343 | + }, |
296 | 344 | { |
297 | 345 | "key": "PADDING_ORACLE", |
298 | 346 | "name": "Cipher is susceptible to Padding Oracle", |
|
347 | 395 | "type": "VULNERABILITY", |
348 | 396 | "url": "https://find-sec-bugs.github.io/bugs.htm#REQUESTDISPATCHER_FILE_DISCLOSURE" |
349 | 397 | }, |
| 398 | + { |
| 399 | + "key": "RPC_ENABLED_EXTENSIONS", |
| 400 | + "name": "Enabling extensions in Apache XML RPC server or client.", |
| 401 | + "type": "VULNERABILITY", |
| 402 | + "url": "https://find-sec-bugs.github.io/bugs.htm#RPC_ENABLED_EXTENSIONS" |
| 403 | + }, |
350 | 404 | { |
351 | 405 | "key": "RSA_KEY_SIZE", |
352 | 406 | "name": "RSA usage with short key", |
|
359 | 413 | "type": "VULNERABILITY", |
360 | 414 | "url": "https://find-sec-bugs.github.io/bugs.htm#RSA_NO_PADDING" |
361 | 415 | }, |
| 416 | + { |
| 417 | + "key": "SAML_IGNORE_COMMENTS", |
| 418 | + "name": "Ignoring XML comments in SAML may lead to authentication bypass", |
| 419 | + "type": "VULNERABILITY", |
| 420 | + "url": "https://find-sec-bugs.github.io/bugs.htm#SAML_IGNORE_COMMENTS" |
| 421 | + }, |
362 | 422 | { |
363 | 423 | "key": "SCALA_COMMAND_INJECTION", |
364 | 424 | "name": "Potential Command Injection (Scala)", |
|
367 | 427 | }, |
368 | 428 | { |
369 | 429 | "key": "SCALA_PATH_TRAVERSAL_IN", |
370 | | - "name": "Potential Path Traversal (file read)", |
| 430 | + "name": "Potential Path Traversal using Scala API (file read)", |
371 | 431 | "type": "VULNERABILITY", |
372 | 432 | "url": "https://find-sec-bugs.github.io/bugs.htm#SCALA_PATH_TRAVERSAL_IN" |
373 | 433 | }, |
|
557 | 617 | "type": "VULNERABILITY", |
558 | 618 | "url": "https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_TURBINE" |
559 | 619 | }, |
| 620 | + { |
| 621 | + "key": "SQL_INJECTION_VERTX", |
| 622 | + "name": "Potential SQL Injection with Vert.x Sql Client", |
| 623 | + "type": "VULNERABILITY", |
| 624 | + "url": "https://find-sec-bugs.github.io/bugs.htm#SQL_INJECTION_VERTX" |
| 625 | + }, |
560 | 626 | { |
561 | 627 | "key": "SSL_CONTEXT", |
562 | 628 | "name": "Weak SSLContext", |
|
611 | 677 | "type": "VULNERABILITY", |
612 | 678 | "url": "https://find-sec-bugs.github.io/bugs.htm#TEMPLATE_INJECTION_FREEMARKER" |
613 | 679 | }, |
| 680 | + { |
| 681 | + "key": "TEMPLATE_INJECTION_PEBBLE", |
| 682 | + "name": "Potential template injection with Pebble", |
| 683 | + "type": "VULNERABILITY", |
| 684 | + "url": "https://find-sec-bugs.github.io/bugs.htm#TEMPLATE_INJECTION_PEBBLE" |
| 685 | + }, |
614 | 686 | { |
615 | 687 | "key": "TEMPLATE_INJECTION_VELOCITY", |
616 | 688 | "name": "Potential template injection with Velocity", |
|
695 | 767 | "type": "VULNERABILITY", |
696 | 768 | "url": "https://find-sec-bugs.github.io/bugs.htm#WICKET_ENDPOINT" |
697 | 769 | }, |
| 770 | + { |
| 771 | + "key": "WICKET_XSS1", |
| 772 | + "name": "Disabling HTML escaping put the application at risk for XSS", |
| 773 | + "type": "VULNERABILITY", |
| 774 | + "url": "https://find-sec-bugs.github.io/bugs.htm#WICKET_XSS1" |
| 775 | + }, |
698 | 776 | { |
699 | 777 | "key": "XML_DECODER", |
700 | 778 | "name": "XMLDecoder usage", |
|
0 commit comments