Page tree
Skip to end of metadata
Go to start of metadata

Exploitable Security Issues (103)

NameSeveritySecond-Order AnalysisCWE [?]OWASP Top 10 (2010) [?]OWASP Top 10 (2013) [?]OWASP Top 10 (2017) [?]SANS 25 [?]PCI DSS [?]ASVS [?]
Command ExecutionCriticalYes78A1A1A126.5.15.12
Code ExecutionCriticalYes95A1A1A1186.5.116.4
File Write (Arbitrary)CriticalYes96A1A1A1106.5.816.2
File Write (PHP file)CriticalYes96A1A1A1106.5.8
Code Execution (eval modifier)CriticalYes624A1A1A1186.5.116.4
Remote File InclusionCriticalYes98A1A4A5136.5.85.13
SQL InjectionCriticalYes89A1A1A116.5.15.1
SQL Injection (unquoted)CriticalYes89A1A1A116.5.15.1
SQL Injection (single-quoted)CriticalYes89A1A1A116.5.15.1
SQL Injection (double-quoted)CriticalYes89A1A1A116.5.15.1
SQL Injection (multiple-input)CriticalYes89A1A1A116.5.15.1
PHP Object InjectionCriticalNo502A4A4A8186.5.1
Phar DeserializationHighNo915A4A4A8166.5.816.4
Local File InclusionHighYes97A4A4A5136.5.85.13
Local File Inclusion (limited)HighYes626A4A4A5136.5.85.13
File InclusionHighYes98A4A4A5136.5.85.13
LDAP InjectionHighYes90A1A1A1
6.5.1
Path TraversalHighYes22A4A4A5136.5.89.5
PHP Object InstantiationHighNo470A4A4A5106.5.816.4
CVEHighYes

A9A9
6.2
Buffer OverflowHighYes120
A9A936.25.1
Incorrect Buffer SizeHighYes131
A9A9206.2
Denial of ServiceHighYes400
A9A9
6.2
Integer OverflowHighYes190
A9A9246.2
Format StringHighYes134
A9A9236.2
Security BypassHighYes693
A9A9186.2
Use After FreeHighYes416
A9A9
6.2
Double FreeHighYes415
A9A9
6.2
Null Pointer DereferenceHighYes476
A9A9
6.2
Type ConfusionHighYes843
A9A9
6.2
Path Traversal (limited)HighYes626A4A4A5136.5.89.5
Denial of ServiceHighYes730A1A5A1
6.5.5
XQuery InjectionMediumYes652A1A1A1
6.5.15.14
XPath InjectionMediumYes643A1A1A1
6.5.15.14
XPath Injection (unquoted)MediumYes643A1A1A1
6.5.15.14
XPath Injection (single-quoted)MediumYes643A1A1A1
6.5.15.14
XPath Injection (double-quoted)MediumYes643A1A1A1
6.5.15.14
Reflection InjectionMediumNo470A1A7A5166.5.816.4
XSLT InjectionMediumYes494A1A1A196.5.15.14
File CreateMediumYes73A4A4A5136.5.816.2
File DeleteMediumYes73A4A4A10136.5.89.5
File ManipulationMediumYes732A4A4A5176.5.89.5
XML/XXE InjectionMediumYes91A1A1A4
6.5.15.14
File UploadMediumNo434
A5A596.5.8
Cross-Site ScriptingMediumYes79A2A3A746.5.75.15
Cross-Site Scripting (normal tag)MediumYes80A2A3A746.5.75.15
Cross-Site Scripting (script tag)MediumYes79A2A3A746.5.75.15

Cross-Site Scripting (style tag)

MediumYes79A2A3A746.5.75.15
Cross-Site Scripting (comment)MediumYes79A2A3A746.5.75.15
Cross-Site Scripting (attribute name)MediumYes79A2A3A746.5.75.15
Cross-Site Scripting (unquoted attribute)MediumYes79A2A3A746.5.75.15
Cross-Site Scripting (single-quoted attribute)MediumYes79A2A3A746.5.75.15
Cross-Site Scripting (double-quoted attribute)MediumYes79A2A3A746.5.75.15
Cross-Site Scripting (eventhandler)MediumYes83A2A3A746.5.75.15
Cross-Site Scripting (url attribute)MediumYes84A2A3A746.5.75.15
Cross-Site Scripting (style attribute)MediumYes79A2A3A746.5.75.15
File WriteMediumYes96A4A1A1106.5.816.2
File Write (JSON file)MediumYes79A4A4A5106.5.816.2
File Write (CSS file)MediumYes79A2A3A7106.5.816.2
File Write (HTML file)MediumYes79A2A3A7106.5.816.2
Server-Side JavaScript InjectionMediumYes94A1A1A1166.5.1
NoSQL InjectionMediumYes94A1A1A1
6.5.1
MongoDB InjectionMediumYes94A1A1A1
6.5.1
Session FixationMediumNo384A3A2A2
6.5.103.1
Server-Side Request ForgeryMediumNo918A8A10A2
6.5.116.1
Open RedirectMediumNo601A10A10A2226.5.816.1
Reflection Injection (Autoload)MediumNo23A4A7A5136.5.816.4
HTTP Response SplittingMediumNo113A10A10A1

3.1
Variable TamperingMediumYes627A4A4A2
6.5.816.4
Variable Tampering (register globals)MediumYes621A3A5A2106.5.816.4
Variable Tampering (write)MediumYes473A4A4A2
6.5.816.4
Variable Tampering (read)MediumYes621A4A4A2
6.5.816.4
Mass AssignmentMediumYes915A4A4A2106.5.85.16
Log ForgeLowYes117A4A4A10

8.8
Memcached InjectionLowYes143A1A1A1206.5.1
Connection String InjectionLowYes99A3A5A2166.5.4
Connection String Injection (FTP)LowYes99A3A5A2166.5.4
Connection String Injection (DBMS)LowYes99A3A5A2166.5.4
Resource InjectionLowNo93A9A4A5166.5.1
Resource Injection (Mail)LowNo93A9A4A5166.5.1
Resource Injection (FTP)LowNo93A9A4A5166.5.1
Environment ManipulationLowYes471A4A5A2106.5.8
Library InjectionLowNo114A1A5A111

HTTP Parameter PollutionLowNo233A10A10A2
6.5.45.17
Directory ListingLowYes548A4A4A5136.5.84.5
Information LeakageLowYes209A6A6A6
6.5.58.1
Information Leakage (System)LowYes214A6A6A6
6.5.58.1
Information Leakage (SQL Error)LowYes209A6A6A6
6.5.58.1
Information Leakage (Session Token in URL)LowYes201A3A2A2
6.5.103.6
Information Leakage (Password)LowYes209A6A6A6
6.5.5
Information Leakage (Crypto)LowYes209A6A6A6
6.5.5
Weak CryptographyLowYes310A9A6A3
6.5.3
Weak Cryptography (broken algorithm)LowYes327A9A6A3196.5.37.8
Weak Cryptography (static parameter)LowYes328A9A6A3
6.5.3
Weak Cryptography (low entropy)LowYes330A9A6A3
6.5.37.15
Weak Cryptography (missing padding)LowYes325A9A6A3
6.5.3
Weak Cryptography (unsafe storage)LowYes
A7A6A386.5.3
Weak Cryptography (unsafe hash comparison)LowYes
A3A6A3
6.5.3
Weak Cryptography (cert verification)LowYes295A9A6A3
6.5.410.3

Misconfiguration Issues (65)

NameSeverityCWEOWASP Top 10 (2010)OWASP Top 10 (2013)OWASP Top 10 (2017)SANS 25PCI DSSASVS

Used Root User

Medium
A6
A6


Disabled CSRF Protection

Medium

352

A5A8A6


Cookie Misconfiguration (use for session)

Low
A6A5A6
6.5.10

Cookie Misconfiguration (session only with cookie)

Low
A9A5A6
6.5.10

Cookie Misconfiguration (domain)

Low
A6A5A6
6.5.10

Cookie Misconfiguration (only http)

Low
A6A5A6
6.5.10

Cookie Misconfiguration (secure flag)

Low
A9A5A6
6.5.10

Enabled Bug Compatability

Low
A6A5A6


Enabled Bug Compatibility (warning)

Low
A6A5A6


Session Misconfiguration (weak hash)

Low
A3A2A6
6.5.10

Session Misconfiguration (path)

Low
A3A2A6
6.5.10

Session Misconfiguration (trans_sid)

Low
A3A2A6
6.5.10

Session Misconfiguration (entropy file)

Low
A3A2A6
6.5.10

Session Misconfiguration (strict mode)

Low
A3A2A6
6.5.10

Session Misconfiguration (lazy write)

Low
A3A2A6
6.5.10

Session Misconfiguration (default name)

Low
A3A2A6
6.5.10

Remote File Open (allow_url_fopen)

Low
A6A1A6


Remote File Include (allow_url_include)

Low
A6A1A6


Error Displaying

Low
A6A6A6


No Error Log

Low
A6
A6


Display PHP Signature

Low
A6A6A6


Enabled Register Globals

Low518A6A5A6


Enabled Magic Quotes

Low
A6A5A6


Enabled Magic Quotes Runtime

Low
A6A5A6


Too Large Maximum Post Size

Low
A6A5A6


Safe Mode Enabled

Low
A6
A6


Long Arrays Allowed

Low
A6A5A6


No Maximum Input Var Set

Low
A6A5A6


No PHP File Access Restriction

Low
A6A1A6


No Maximum Set (file size)

Low
A6A5A6


Too High Maximum (file size)

Low
A6A5A6


No Maximum Set (post)

Low
A6A5A6


Too High Limit (post)

Low
A6A5A6


No Maximum Set (memory)

Low
A6A5A6


Too High Limit (memory)

Low
A6A5A6


Allowed ASP Tags

Low
A6
A6


No UTF-8 as Default Charset

Low
A6
A6


Enabled Zend Compatibility

Low
A6A5A6


Xdebug Waiting For Client

Low
A6A6A6


Enabled Dangerous Functions

Low
A6A5A6


SOAP WSDL Cache Directory

Low
A6A5A6


Wrong Upload Directory

Low
A6A1A6


Use Default Values

Low
A6A5A6


Hardcoded Parameter

Low259A6
A6


Disabled Validation

Low
A6A5A6


No File Extension Restriction

Low
A6A1A6


Disabled mod_mime_fix

Low
A6A1A6


Disabled Mime Type Detection

Low
A6A1A6


Allow Insecure FTP File Upload

Low
A6A1A6


Disabled XSS Filter

Low
A6A3A6


Hardcoded Password

Low259A6
A6


Weak Password

Low
A6A5A6


Default or Weak Salts and Keys

Low
A9A5A6


Enabled Debug Mode

Low
A6A6A6


Use Basic Auth

Low
A6A5A6


Disabled SSL Secured Login

Low
A9A5A6


Disabled SSL Secured Login for Admins

Low
A9A5A6

Enabled Plugin and Theme Editor

Low
A6A5A6


Enabled Plugin and Theme Installation

Low
A6A5A6


Disabled Auto Update

Low
A6A5A6


Allow External URL Requests

Low
A10A10A6


Allow Unauthenticated DB Repair

Low
A6
A6


Weak Encryption (mode)

Low
A7A5A6


Weak Encryption (cipher)

Low
A7A5A6


Showing Startup Errors

Low
A6A6A6


Code Quality Issues (44)

NameSeverityCWE [?]OWASP Top 10 (2010)OWASP Top 10 (2013) [?]OWASP Top 10 (2017)SANS 25 [?]PCI DSS [?]ASVS [?]
External Variable InitializationMedium454





Variable Extraction ErrorMedium621





Cookie MisconfigurationLow494A6A5A6
6.5.103.12
Cookie Misconfiguration (expiry)Low539A6A5A6
6.5.103.4
Cookie Misconfiguration (secure flag)Low614A6A5A6
6.5.10
Cookie Misconfiguration (path)Low287A6A5A6
6.5.10
Cookie Misconfiguration (domain)Low287A6A5A6
6.5.10
Cookie Misconfiguration (httpOnly flag)Low200A6A5A6
6.5.10
Weak HTTP headerLow644A6A5A6
6.5.4
Generic Exception CatchLow396





Hard-coded PasswordLow259





Dangerous PHP FeatureLow242





Executable RegexLow624





Execution After RedirectLow698
A7A2


Weak Strict-Transport-Security headerLow523A6A5A6
6.5.410.11
Weak X-XSS Protection headerLow693A6A5A6
4.1.g11.8
Weak CSP headerLow693A6A5A6
6.5.411.7
Weak CORS HeaderLow346A6A5A6
6.5.416.5
Weak XFO headerLow1021A6A6A6
6.5.411.4
Divide By ZeroLow369





Dynamic SQL QueryLow89





Missing Error HandlingLow390





Missing Default CaseLow478





Omitted Break StatementLow484





Deprecated PHP FeatureLow477





Permissive RegexLow625





Weak Hash FunctionLow328A7




Type Unsafe ComparisonLow597





Generic Exception ThrowLow397





Empty Exception CatchLow755





Uncaught ExceptionLow248





Return Inside FinallyLow584





Expression Always TrueLow571





Expression Always FalseLow572





Ignored Return ValueLow253





Write to $GLOBALSLow518





Loop Iteration ChangeLow834





Leftover Debug CodeLow489





Assign Instead CompareLow481





Compare Instead AssignLow482





Decision by CookieLow784A3A2A2


Decision by DNSLow350A3A2A2


Decision by IPLow291A3A2A2


Parse errorLow






Suspicious CommentLow546





  • No labels