Tag: top25-cwes
Creating file paths from untrusted input might give a malicious actor access to sensitive files.
Relying on potentially untrusted user inputs when constructing web application outputs can lead to cross-site scripting vulnerabilities.
Server-side request forgery (SSRF) is a vulnerability that allows an attacker to manipulate a web application to make unintended requests from the server.
Insecure configuration can lead to a cross-site request forgery (CSRF) vulnerability.
Hardcoded credentials can be intercepted by malicious actors.
Possible unintended system commands could be executed through user input.
Use of untrusted inputs in SQL database query can enable attackers to read, modify, or delete sensitive data in the database