JavaScript
FortiCNAPP supports JavaScript across all our integrations and all interfaces involving our scanners.
The following provides a list of CWEs that the SAST scanners detect for JavaScript:
|
CWE |
Weakness Name |
|---|---|
| CWE-22 | Improper Limitation of a Path Name to a Restricted Directory |
|
CWE-78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
| CWE-79 | Improper Neutralization of Input During Web Page Generation |
| CWE-89 | Improper Neutralization of Special Elements used in an SQL Command |
| CWE-95 | Improper Neutralization of Directives in Dynamically Evaluated Code |
| CWE-134 | Function Accepts Externally-Controlled Format String |
|
CWE-276 |
|
|
CWE-287 |
|
|
CWE-295 |
|
| CWE-319 | Cleartext Transmission of Sensitive Data |
|
CWE-328 |
|
|
CWE-338 |
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) |
|
CWE-345 |
|
|
CWE-346 |
|
|
CWE-352 |
|
| CWE-522 | Insufficiently Protected Authentication Credentials |
| CWE-601 | Web Application Accepts URL Redirection to Untrusted Site |
|
CWE-611 |
|
|
CWE-613 |
|
|
CWE-614 |
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute |
|
CWE-1004 |
|
|
CWE-1275 |
Sensitive Cookie in HTTPS Session Without 'SameSite' Attribute (Not Official, Inferred) |