Fortinet white logo
Fortinet white logo

Administration Guide

Vulnerabilities: Internal code

Vulnerabilities: Internal code

The Code security > Applications > Vulnerabilities: Internal code page provides a list of first party code vulnerabilities found by our SAST scanner. This page is broken down by scan results from the SAST scanner using the toggle underneath the filter bar.

SAST

The SAST view includes a table representing a list of findings from the SAST scanner. The findings are grouped by the specific SAST rule and is sorted by the number of findings associated to the rule. The sort can be configured by any other column in the table.

You can use the search and filter options at the top of the page to update the list of SAST results displayed.

For each finding, the following data is provided in the table:

Weakness name The name of the CWE weakness associated to the finding.
CWE ID The unique identifier for the code weakness. It can be used to search for findings by a specific OWASP 10 weakness type.
Instances The number of findings across scans that are associated to the specific weakness.
Impacted repositories The number of repositories where the results are found.
First detected

The first outstanding finding that we have detected. Note, if the finding is fixed, the timestamp updates to the next subsequent first finding.

Vulnerabilities: Internal code

Vulnerabilities: Internal code

The Code security > Applications > Vulnerabilities: Internal code page provides a list of first party code vulnerabilities found by our SAST scanner. This page is broken down by scan results from the SAST scanner using the toggle underneath the filter bar.

SAST

The SAST view includes a table representing a list of findings from the SAST scanner. The findings are grouped by the specific SAST rule and is sorted by the number of findings associated to the rule. The sort can be configured by any other column in the table.

You can use the search and filter options at the top of the page to update the list of SAST results displayed.

For each finding, the following data is provided in the table:

Weakness name The name of the CWE weakness associated to the finding.
CWE ID The unique identifier for the code weakness. It can be used to search for findings by a specific OWASP 10 weakness type.
Instances The number of findings across scans that are associated to the specific weakness.
Impacted repositories The number of repositories where the results are found.
First detected

The first outstanding finding that we have detected. Note, if the finding is fixed, the timestamp updates to the next subsequent first finding.