APSC-DV-000060 |
SV.DOS.TMPFILEDEL
Leaving temporary file for lifetime of JVM
SV.DOS.TMPFILEEXIT
Leaving temporary file
|
APSC-DV-000160 |
SV.HASH.NO_SALT
Use of a one-way cryptographic hash without a salt
SV.SENSITIVE.DATA
Unencrypted sensitive data is written
SV.SENSITIVE.OBJ
Object with unencrypted sensitive data is stored
SV.WEAK.CRYPT
Use of a Broken or Risky Cryptographic Algorithm
|
APSC-DV-000170 |
SV.HASH.NO_SALT
Use of a one-way cryptographic hash without a salt
SV.SENSITIVE.DATA
Unencrypted sensitive data is written
SV.SENSITIVE.OBJ
Object with unencrypted sensitive data is stored
SV.WEAK.CRYPT
Use of a Broken or Risky Cryptographic Algorithm
|
APSC-DV-000460 |
SV.PASSWD.HC.EMPTY
Empty Password
|
APSC-DV-000480 |
SV.EXPOSE.FIELD
Static field may be changed by malicious code
SV.EXPOSE.FIN
Method finalize() should have protected access modifier, not public
SV.EXPOSE.IFIELD
Instance field should be made final
SV.EXPOSE.MUTABLEFIELD
Static mutable field can be accessed by malicious code
SV.EXPOSE.RET
Internal representation may be exposed
SV.EXPOSE.STORE
Method stores reference to mutable object
|
APSC-DV-000650 |
SV.LOG_FORGING
Log Forging
|
APSC-DV-001290 |
SV.LOG_FORGING
Log Forging
|
APSC-DV-001460 |
SV.EMAIL
Unchecked e-mail
UMC.SYSERR
Debug print using System.err method calls is unwanted
UMC.SYSOUT
Debug print using System.out method calls is unwanted
|
APSC-DV-001680 |
SV.PASSWD.HC.EMPTY
Empty Password
|
APSC-DV-001740 |
SV.PASSWD.PLAIN
Plain-text Password
|
APSC-DV-001750 |
SV.PASSWD.PLAIN
Plain-text Password
|
APSC-DV-001810 |
SV.ECV
Empty certificate validation
|
APSC-DV-001850 |
SV.PASSWD.PLAIN
Plain-text Password
|
APSC-DV-001860 |
SV.HASH.NO_SALT
Use of a one-way cryptographic hash without a salt
SV.SENSITIVE.DATA
Unencrypted sensitive data is written
SV.SENSITIVE.OBJ
Object with unencrypted sensitive data is stored
SV.WEAK.CRYPT
Use of a Broken or Risky Cryptographic Algorithm
|
APSC-DV-001995 |
JD.NEXT
Possible 'NoSuchElementException'
JD.SYNC.IN
Inconsistent synchronization
SV.SHARED.VAR
Unsynchronized access to static variable from servlet
SV.STRUTS.STATIC
Struts Forms: static fields
SV.UMC.THREADS
Bad practices: use of thread management
|
APSC-DV-002000 |
RLK.NIO
NIO object is not closed on exit
RLK.SOCK
Socket is not closed on exit
|
APSC-DV-002010 |
SV.HASH.NO_SALT
Use of a one-way cryptographic hash without a salt
SV.SENSITIVE.DATA
Unencrypted sensitive data is written
SV.SENSITIVE.OBJ
Object with unencrypted sensitive data is stored
SV.WEAK.CRYPT
Use of a Broken or Risky Cryptographic Algorithm
|
APSC-DV-002030 |
SV.HASH.NO_SALT
Use of a one-way cryptographic hash without a salt
SV.SENSITIVE.DATA
Unencrypted sensitive data is written
SV.SENSITIVE.OBJ
Object with unencrypted sensitive data is stored
SV.WEAK.CRYPT
Use of a Broken or Risky Cryptographic Algorithm
|
APSC-DV-002040 |
SV.HASH.NO_SALT
Use of a one-way cryptographic hash without a salt
SV.SENSITIVE.DATA
Unencrypted sensitive data is written
SV.SENSITIVE.OBJ
Object with unencrypted sensitive data is stored
SV.WEAK.CRYPT
Use of a Broken or Risky Cryptographic Algorithm
|
APSC-DV-002290 |
SV.RANDOM
Use of insecure Random number generator
|
APSC-DV-002350 |
SV.HASH.NO_SALT
Use of a one-way cryptographic hash without a salt
SV.SENSITIVE.DATA
Unencrypted sensitive data is written
SV.SENSITIVE.OBJ
Object with unencrypted sensitive data is stored
SV.WEAK.CRYPT
Use of a Broken or Risky Cryptographic Algorithm
|
APSC-DV-002360 |
SV.CLEXT.POLICY
Class extends 'java.security.Policy'
SV.USE.POLICY
Direct use methods of Policy
|
APSC-DV-002400 |
SV.DOS.ARRINDEX
Tainted index used for array access
SV.DOS.ARRSIZE
Tainted size used for array allocation
SV.TAINT_NATIVE
Tainted data goes to native code
SV.TMPFILE
Temporary file path tampering
SV.UMC.EXIT
The System.exit() and Runtime.exit() method calls should not be used in servlets code
|
APSC-DV-002480 |
SV.IL.DEV
Design information leakage
SV.IL.FILE
File Name Leaking
SV.STRBUF.CLEAN
String buffer not cleaned
SV.STRUTS.NOTRESET
Struts Forms: inconsistent reset
|
APSC-DV-002490 |
ANDROID.LIFECYCLE.SV.GETEXTRA
Unvalidated external data
SV.HTTP_SPLIT
Http Response Splitting
SV.XSS.DB
Cross Site Scripting (Stored XSS)
SV.XSS.REF
Cross Site Scripting (Reflected XSS)
|
APSC-DV-002500 |
SV.CSRF.GET
CSRF Token in GET request
SV.CSRF.ORIGIN
Request handler without an origin check
SV.CSRF.TOKEN
State changing request handler without a CSRF check
|
APSC-DV-002510 |
SV.CLASSDEF.INJ
Runtime Class Definition Injection
SV.CLASSLOADER.INJ
Class Loader URL Injection
SV.CLEXT.CLLOADER
Class extends 'java.lang.ClassLoader'
SV.EXEC
Process Injection
SV.EXEC.DIR
Process Injection. Working Directory
SV.EXEC.ENV
Process Injection. Environment Variables
SV.EXEC.LOCAL
Process Injection. Local Arguments
SV.PATH
Path and file name injection
SV.PATH.INJ
File injection
SV.SCRIPT
Script Execution
SV.SERIAL.INON
Interface extends 'Serializable'
SV.SERIAL.NON
Class implements 'Serializable'
SV.SERIAL.NOREAD
Method readObject() should be defined for a serializable class
SV.SERIAL.NOWRITE
Method writeObject() should be defined for a serializable class
SV.SERIAL.SIG
Methods readObject() and writeObject() in serializable classes should have correct signature
|
APSC-DV-002530 |
ANDROID.LIFECYCLE.SV.FRAGMENTINJ
Unvalidated fragment class name
CMP.CLASS
Comparing by classname
SV.DATA.BOUND
Untrusted Data leaks into trusted storage
SV.DATA.DB
Data injection
SV.LDAP
Unvalidated user input is used as LDAP filter
SV.STRUTS.NOTVALID
Struts Forms: inconsistent validate
SV.STRUTS.VALIDMET
Struts Forms: validate method
SV.TAINT
Tainted data
SV.XPATH
Unvalidated user input is used as an XPath expression
|
APSC-DV-002540 |
SV.SQL
Sql Injection
SV.SQL.DBSOURCE
Unchecked information from the database is used in SQL statements
|
APSC-DV-002560 |
ANDROID.LIFECYCLE.SV.FRAGMENTINJ
Unvalidated fragment class name
CMP.CLASS
Comparing by classname
SV.DATA.BOUND
Untrusted Data leaks into trusted storage
SV.DATA.DB
Data injection
SV.LDAP
Unvalidated user input is used as LDAP filter
SV.STRUTS.NOTVALID
Struts Forms: inconsistent validate
SV.STRUTS.VALIDMET
Struts Forms: validate method
SV.TAINT
Tainted data
SV.XPATH
Unvalidated user input is used as an XPath expression
|
APSC-DV-002590 |
SV.INT_OVF
Tainted data may lead to Integer Overflow
|
APSC-DV-002950 |
JD.INF.AREC
Apparent infinite recursion
JD.LOCK
Lock without unlock
JD.LOCK.NOTIFY
Method 'notify' called with locks held
JD.LOCK.SLEEP
Method 'sleep' called with locks held
JD.LOCK.WAIT
Method 'wait' called with locks held
|
APSC-DV-003100 |
SV.HASH.NO_SALT
Use of a one-way cryptographic hash without a salt
SV.SENSITIVE.DATA
Unencrypted sensitive data is written
SV.SENSITIVE.OBJ
Object with unencrypted sensitive data is stored
SV.WEAK.CRYPT
Use of a Broken or Risky Cryptographic Algorithm
|
APSC-DV-003110 |
SV.PASSWD.HC
Hardcoded Password
|
APSC-DV-003215 |
JD.THREAD.RUN
Explicit call to a 'Thread.run' method
JD.UMC.FINALIZE
Explicit call to method 'Object.finalize'
JD.UMC.RUNFIN
runFinalizersOnExit() is called
MNA.CAP
Method name should start with non-capital letter
MNA.CNS
Method name is same as constructor name but it is not a constructor
MNA.SUS
Suspicious method name
|
APSC-DV-003235 |
ECC.EMPTY
Empty catch clause
EXC.BROADTHROWS
Method has an overly broad throws declaration
JD.CATCH
Catching runtime exception
JD.UNCAUGHT
Uncaught exception
RI.IGNOREDCALL
The value returned by a method called on immutable object is ignored
RI.IGNOREDNEW
Newly created object is ignored
RR.IGNORED
The returned value is ignored
|
APSC-DV-003280 |
SV.PASSWD.HC
Hardcoded Password
|
APSC-DV-003320 |
SV.DOS.ARRINDEX
Tainted index used for array access
SV.DOS.ARRSIZE
Tainted size used for array allocation
SV.TAINT_NATIVE
Tainted data goes to native code
SV.TMPFILE
Temporary file path tampering
SV.UMC.EXIT
The System.exit() and Runtime.exit() method calls should not be used in servlets code
|