Skip to main content

CWEs that violate security standards

This section lists the Common Weakness Enumerations (CWEs) found in your application during Veracode Static Analysis or Veracode DAST that violate security standards, including Veracode's security rating for the CWEs. In your security policies, you can apply the Security Standards rule and select one or more security standards for the applications to which a policy is assigned. To pass policy, applications must not contain the CWEs defined in the selected standards.

Veracode Manual Penetration Testing scans might report any valid CWE, including those not listed here.

Veracode identifies the CWEs in the following ways:

  • Reporting CWEs explicitly listed in the official CWE mappings for the security standard.
  • Reporting CWEs that are children or parents of a CWE listed in the official CWE mappings. Veracode generally includes these CWEs if it reports a security category under a more specific or more general CWE than what appears in the standard mapping. For example, Veracode usually reports cross-site scripting found in Static Analyses as CWE 80, but a standard mapping lists it as CWE 79.

The OWASP 2021 standard

The following table lists all the CWEs that might cause an application to not pass a policy that includes an Auto-Update OWASP policy rule.

CWE IDCWE nameStatic supportDynamic supportVeracode severity
15External Control of System or Configuration SettingX 4 - High
16Configuration X0 - Informational
20Improper Input ValidationX 0 - Informational
22Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)XX3 - Medium
35Path Traversal: '.../...//'X 2- Low
73External Control of File Name or PathX 3 - Medium
74Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) X4 - High
77Improper Neutralization of Special Elements used in a Command (Command Injection)X 5 - Very High
78Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)XX5 - Very High
79Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)XX3 - Medium
80Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)XX3 - Medium
83Improper Neutralization of Script in Attributes in a Web PageXX3 - Medium
86Improper Neutralization of Invalid Characters in Identifiers in Web PagesX 3 - Medium
88Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')X 3 - Medium
89Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)XX4 - High
90Improper Neutralization of Special Elements used in an LDAP Query (LDAP Injection)X 3 - Medium
91XML Injection (aka Blind XPath Injection)XX3 - Medium
93Improper Neutralization of CRLF Sequences (CRLF Injection)X 3 - Medium
94Improper Control of Generation of Code (Code Injection)X 3 - Medium
95Improper Neutralization of Directives in Dynamically Evaluated Code (Eval Injection)XX5 - Very High
98Improper Control of Filename for Include/Require Statement in PHP Program (PHP Remote File Inclusion)XX4 - High
99Improper Control of Resource Identifiers (Resource Injection)X 3 - Medium
112Missing XML ValidationX 3 - Medium
113Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Response Splitting)XX3 - Medium
114Process ControlX 5 - Very High
117Improper Output Neutralization for LogsX 3 - Medium
129Improper Validation of Array IndexX 3 - Medium
134Use of Externally-Controlled Format StringX 5 - Very High
159Improper Handling of Invalid Use of Special ElementsX 0 - Informational
183Permissive List of Allowed InputsX 3 - Medium
200Exposure of Sensitive Information to an Unauthorized ActorXX2 - Low
201Insertion of Sensitive Information Into Sent DataX 2 - Low
209Generation of Error Message Containing Sensitive InformationXX2 - Low
215Insertion of Sensitive Information Into Debugging CodeXX2 - Low
223Omission of Security-relevant InformationX 2 - Low
256Plaintext Storage of a PasswordX 3 - Medium
259Use of Hard-coded PasswordXX3 - Medium
261Weak Encoding for PasswordX 3 - Medium
272Least Privilege ViolationX 3 - Medium
282Improper Ownership ManagementX 3 - Medium
285Improper AuthorizationXX3 - Medium
287Improper AuthenticationXX4 - High
295Improper Certificate ValidationX 3 - Medium
296Improper Following of a Certificate's Chain of Trust X3 - Medium
297Improper Validation of Certificate with Host MismatchXX3 - Medium
298Improper Validation of Certificate Expiration X3 - Medium
299Improper Check for Certificate Revocation X3 - Medium
311Missing Encryption of Sensitive DataX 3 - Medium
312Cleartext Storage of Sensitive InformationX 3 - Medium
313Cleartext Storage in a File or on DiskX 3 - Medium
316Cleartext Storage of Sensitive Information in MemoryX 3 - Medium
319Cleartext Transmission of Sensitive InformationX 3 - Medium
321Use of Hard-coded Cryptographic KeyXX3 - Medium
326Inadequate Encryption StrengthXX3 - Medium
327Use of a Broken or Risky Cryptographic AlgorithmXX3 - Medium
328Use of Weak HashX 3 - Medium
329Generation of Predictable IV with CBC ModeX 2 - Low
330Use of Insufficiently Random ValuesX 3 - Medium
331Insufficient EntropyX 3 - Medium
338Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)X 3 - Medium
345Insufficient Verification of Data AuthenticityX 4 - High
346Origin Validation ErrorX 3 - Medium
347Improper Verification of Cryptographic SignatureX 2 - Low
350Reliance on Reverse DNS Resolution for a Security-Critical ActionX 3 - Medium
352Cross-Site Request Forgery (CSRF)XX3 - Medium
354Improper Validation of Integrity Check ValueX 3 - Medium
359Exposure of Private Personal Information to an Unauthorized ActorX 2 - Low
377Insecure Temporary FileX 3 - Medium
384Session FixationXX3 - Medium
402Transmission of Private Resources into a New Sphere ('Resource Leak') X3 - Medium
421Race Condition During Access to Alternate ChannelX 3 - Medium
426Untrusted Search PathX 3 - Medium
427Uncontrolled Search Path ElementX 3 - Medium
434Unrestricted Upload of File with Dangerous Type X4 - High
441Unintended Proxy or Intermediary ('Confused Deputy')X 3 - Medium
470Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')X 3 - Medium
472External Control of Assumed-Immutable Web ParameterX 3 - Medium
494Download of Code Without Integrity CheckX 5 - Very High
497Exposure of Sensitive System Information to an Unauthorized Control SphereX 2 - Low
501Trust Boundary ViolationX 3 - Medium
502Deserialization of Untrusted DataX 3 - Medium
522Insufficiently Protected CredentialsXX3 - Medium
526Exposure of Sensitive Information Through Environmental Variables X2 - Low
530Exposure of Backup File to an Unauthorized Control Sphere X2 - Low
532Insertion of Sensitive Information into Log FileX 2 - Low
538Insertion of Sensitive Information into Externally-Accessible File or Directory X2 - Low
547Use of Hard-coded, Security-relevant ConstantsX 3 - Medium
548Information Exposure Through Directory Listing X2 - Low
564SQL Injection: HibernateX 4 - High
566Authorization Bypass Through User-Controlled SQL Primary KeyX 3 - Medium
601URL Redirection to Untrusted Site ('Open Redirect')XX3 - Medium
611Improper Restriction of XML External Entity Reference (XXE)XX3 - Medium
614Sensitive Cookie in HTTPS Session Without 'Secure' AttributeXX2 - Low
615Inclusion of Sensitive Information in Source Code CommentsXX0 - Informational
639Authorization Bypass Through User-Controlled KeyX 4 - High
642External Control of Critical State Data X2 - Low
656Reliance on Security Through ObscurityX 0 - Informational
668Exposure of Resource to Wrong SphereXX3 - Medium
708Incorrect Ownership AssignmentX 4 - High
732Incorrect Permission Assignment for Critical ResourceX 3 - Medium
757Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')XX3 - Medium
760Use of a One-Way Hash with a Predictable SaltX 3 - Medium
780Use of RSA Algorithm without OAEPX 3 - Medium
798Use of Hard-coded CredentialsX 3 - Medium
829Inclusion of Functionality from Untrusted Control SphereXX3 - Medium
830Inclusion of Web Functionality from an Untrusted Source X2 - Low
915Improperly Controlled Modification of Dynamically-Determined Object AttributesX 3 - Medium
916Use of Password Hash With Insufficient Computational EffortX 3 - Medium
918Server-Side Request Forgery (SSRF)XX3 - Medium
926Improper Export of Android Application ComponentsX 3 - Medium
942Permissive Cross-domain Policy with Untrusted DomainsXX3 - Medium
943Improper Neutralization of Special Elements in Data Query LogicX 4 - High
1174ASP.NET Misconfiguration: Improper Model ValidationX 2 - Low
1236Improper Neutralization of Formula Elements in a CSV FileX 3 - Medium

The OWASP 2017 standard

The following table lists all the CWEs that might cause an application to not pass a policy that includes an OWASP 2017 policy rule.

CWE IDCWE nameStatic supportDynamic supportVeracode severity
5J2EE Misconfiguration: Data Transmission Without Encryption   
9J2EE Misconfiguration: Weak Access Permissions for EJB Methods   
13ASP.NET Misconfiguration: Password in Configuration File   
16Configuration X0 - Informational
22Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)XX3 - Medium
23Relative Path Traversal   
24Path Traversal: '../filedir'   
25Path Traversal: '/../filedir'   
26Path Traversal: '/dir/../filename'   
27Path Traversal: 'dir/../../filename'   
28Path Traversal: '..\filedir'   
29Path Traversal: '\..\filename'   
30Path Traversal: '\dir\..\filename'   
31Path Traversal: 'dir\..\..\filename'   
32Path Traversal: '...' (Triple Dot)   
33Path Traversal: '....' (Multiple Dot)   
34Path Traversal: '....//'   
35Path Traversal: '.../...//'   
36Absolute Path Traversal   
37Path Traversal: '/absolute/pathname/here'   
38Path Traversal: '\absolute\pathname\here'   
39Path Traversal: 'C:dirname'   
40Path Traversal: '\\UNC\share\name\' (Windows UNC Share)   
74Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) X4 - High
75Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)   
76Improper Neutralization of Equivalent Special Elements   
77Improper Neutralization of Special Elements used in a Command (Command Injection)X 5 - Very High
78Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)XX5 - Very High
79Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)XX3 - Medium
80Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)XX3 - Medium
81Improper Neutralization of Script in an Error Message Web Page   
82Improper Neutralization of Script in Attributes of IMG Tags in a Web Page   
83Improper Neutralization of Script in Attributes in a Web Page X3 - Medium
84Improper Neutralization of Encoded URI Schemes in a Web Page   
85Doubled Character XSS Manipulations   
86Improper Neutralization of Invalid Characters in Identifiers in Web PagesX 3 - Medium
87Improper Neutralization of Alternate XSS Syntax   
88Argument Injection or ModificationX 3 - Medium
89Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)XX4 - High
90Improper Neutralization of Special Elements used in an LDAP Query (LDAP Injection)X 3 - Medium
91XML Injection (aka Blind XPath Injection)X 3 - Medium
93Improper Neutralization of CRLF Sequences (CRLF Injection)X 3 - Medium
94Improper Control of Generation of Code (Code Injection)X 3 - Medium
95Improper Neutralization of Directives in Dynamically Evaluated Code (Eval Injection)X 5 - Very High
96Improper Neutralization of Directives in Statically Saved Code (Static Code Injection)   
97Improper Neutralization of Server-Side Includes (SSI) Within a Web Page   
98Improper Control of Filename for Include/Require Statement in PHP Program (PHP Remote File Inclusion)XX4 - High
99Improper Control of Resource Identifiers (Resource Injection)X 3 - Medium
102Struts: Duplicate Validation Forms   
113Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Response Splitting)XX3 - Medium
117Improper Output Neutralization for LogsX 3 - Medium
202Exposure of Sensitive Data Through Data Queries   
209Information Exposure Through an Error MessageXX2 - Low
210Information Exposure Through Self-generated Error Message   
211Information Exposure Through Externally-Generated Error Message   
219Sensitive Data Under Web Root   
220Sensitive Data Under FTP Root   
223Omission of Security-relevant InformationX 2 - Low
256Unprotected Storage of CredentialsX 3 - Medium
257Storing Passwords in a Recoverable Format   
258Empty Password in Configuration File   
259Use of Hard-coded PasswordXX3 - Medium
260Password in Configuration File   
261Weak Cryptography for PasswordsX 3 - Medium
262Not Using Password Aging   
263Password Aging with Long Expiration   
266Incorrect Privilege Assignment   
267Privilege Defined With Unsafe Actions   
268Privilege Chaining   
269Improper Privilege Management   
270Privilege Context Switching Error   
271Privilege Dropping / Lowering Errors   
272Least Privilege ViolationX 3 - Medium
276Incorrect Default Permissions   
277Insecure Inherited Permissions   
278Insecure Preserved Inherited Permissions   
279Incorrect Execution-Assigned Permissions   
281Improper Preservation of Permissions   
282Improper Ownership ManagementX 3 - Medium
283Unverified Ownership   
284Improper Access ControlX 3 - Medium
285Improper AuthorizationXX3 - Medium
286Incorrect User Management   
287Improper AuthenticationXX4 - High
288Authentication Bypass Using an Alternate Path or Channel   
289Authentication Bypass by Alternate Name   
290Authentication Bypass by Spoofing   
291Reliance on IP Address for Authentication   
293Using Referer Field for Authentication   
294Authentication Bypass by Capture-replay   
295Improper Certificate ValidationX 3 - Medium
296Improper Following of a Certificate's Chain of Trust X3 - Medium
297Improper Validation of Certificate with Host MismatchXX3 - Medium
298Improper Validation of Certificate Expiration X3 - Medium
299Improper Check for Certificate Revocation X3 - Medium
300Channel Accessible by Non-Endpoint (Man-in-the-Middle)   
301Reflection Attack in an Authentication Protocol   
302Authentication Bypass by Assumed-Immutable Data   
303Incorrect Implementation of Authentication Algorithm   
305Authentication Bypass by Primary Weakness   
306Missing Authentication for Critical Function   
307Improper Restriction of Excessive Authentication Attempts   
308Use of Single-factor Authentication   
309Use of Password System for Primary Authentication   
311Missing Encryption of Sensitive DataX 3 - Medium
312Cleartext Storage of Sensitive InformationX 3 - Medium
313Cleartext Storage in a File or on DiskX 3 - Medium
314Cleartext Storage in the Registry   
315Cleartext Storage of Sensitive Information in a Cookie   
316Cleartext Storage of Sensitive Information in MemoryX 3 - Medium
317Cleartext Storage of Sensitive Information in GUI   
318Cleartext Storage of Sensitive Information in Executable   
319Cleartext Transmission of Sensitive InformationX 3 - Medium
320Key Management Errors   
321Use of Hard-coded Cryptographic KeyXX3 - Medium
322Key Exchange without Entity Authentication   
325Missing Required Cryptographic Step   
326Inadequate Encryption StrengthXX3 - Medium
327Use of a Broken or Risky Cryptographic AlgorithmXX3 - Medium
328Reversible One-Way HashX 3 - Medium
350Reliance on Reverse DNS Resolution for a Security-Critical ActionX 3 - Medium
359Exposure of Private Information (Privacy Violation)X 2 - Low
370Missing Check for Certificate Revocation after Initial Check   
384Session FixationXX3 - Medium
419Unprotected Primary Channel   
420Unprotected Alternate Channel   
421Race Condition During Access to Alternate ChannelX 3 - Medium
422Unprotected Windows Messaging Channel (Shatter)   
425Direct Request (Forced Browsing)   
433Unparsed Raw Web Content Delivery   
462Duplicate Key in Associative List (Alist)   
477Use of Obsolete FunctionsXX0 - Informational
502Deserialization of Untrusted DataX 3 - Medium
520.NET Misconfiguration: Use of Impersonation   
521Weak Password Requirements   
522Insufficiently Protected CredentialsXX3 - Medium
523Unprotected Transport of Credentials   
535Information Exposure Through Shell Error Message   
536Information Exposure Through Servlet Runtime Error Message   
537Information Exposure Through Java Runtime Error Message   
548Information Exposure Through Directory Listing X2 - Low
549Missing Password Field Masking   
550Information Exposure Through Server Error Message   
551Incorrect Behavior Order: Authorization Before Parsing and Canonicalization   
555J2EE Misconfiguration: Plaintext Password in Configuration File   
556ASP.NET Misconfiguration: Use of Identity Impersonation   
564SQL Injection: HibernateX 4 - High
566Authorization Bypass Through User-Controlled SQL Primary KeyX 3 - Medium
599Missing Validation of OpenSSL Certificate   
611Improper Restriction of XML External Entity Reference (XXE)XX3 - Medium
613Insufficient Session Expiration   
614Sensitive Cookie in HTTPS Session Without 'Secure' AttributeXX2 - Low
620Unverified Password Change   
621Variable Extraction Error   
623Unsafe ActiveX Control Marked Safe For Scripting   
624Executable Regular Expression Error   
627Dynamic Variable Evaluation   
639Authorization Bypass Through User-Controlled KeyX 4 - High
640Weak Password Recovery Mechanism for Forgotten Password   
641Improper Restriction of Names for Files and Other Resources   
643Improper Neutralization of Data within XPath Expressions (XPath Injection)   
645Overly Restrictive Account Lockout Mechanism   
647Use of Non-Canonical URL Paths for Authorization Decisions   
648Incorrect Use of Privileged APIs   
652Improper Neutralization of Data within XQuery Expressions (XQuery Injection)   
689Permission Race Condition During Resource Copy   
692Incomplete Denylist to Cross-Site Scripting   
694Use of Multiple Resources with Duplicate Identifier   
708Incorrect Ownership AssignmentX 4 - High
732Incorrect Permission Assignment for Critical ResourceX 3 - Medium
759Use of a One-Way Hash without a Salt   
760Use of a One-Way Hash with a Predictable SaltX 3 - Medium
776Improper Restriction of Recursive Entity References in DTDs (XML Entity Expansion)   
778Insufficient Logging   
780Use of RSA Algorithm without OAEPX 3 - Medium
798Use of Hard-coded CredentialsX 3 - Medium
804Guessable CAPTCHA   
836Use of Password Hash Instead of Password for Authentication   
842Placement of User into Incorrect Group   
862Missing Authorization   
863Incorrect Authorization   
914Improper Control of Dynamically-Identified Variables   
916Use of Password Hash With Insufficient Computational EffortX 3 - Medium
917Improper Neutralization of Special Elements used in an Expression Language Statement (Expression Language Injection)   
923Improper Restriction of Communication Channel to Intended Endpoints   
925Improper Verification of Intent by Broadcast Receiver   
926Improper Export of Android Application Components   
927Use of Implicit Intent for Sensitive Communication   
939Improper Authorization in Handler for Custom URL Scheme   
940Improper Verification of Source of a Communication Channel   
941Incorrectly Specified Destination in a Communication Channel   
942Permissive Cross-domain Policy with Untrusted DomainsXX3 - Medium
943Improper Neutralization of Special Elements in Data Query LogicX 4 - High
1004Sensitive Cookie Without HttpOnly Flag   
1022Use of Web Link to Untrusted Target with window.opener Access   

The OWASP Mobile standard

The following table lists all the CWEs that might cause an application to not pass a policy that includes an OWASP Mobile policy rule.

CWE IDCWE nameStatic supportVeracode severity
15External Control of System or Configuration SettingX4 - High
73External Control of File Name or PathX3 - Medium
77Improper Neutralization of Special Elements in a CommandX5 - Very High
78Improper Neutralization of Special Elements in an OS CommandX5 - Very High
80Improper Neutralization of Script Related HTML TagsX3 - Medium
88Improper Neutralization of Argument DelimetersX3 - Medium
89Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)X4 - High
114Process ControlX5 - Very High
183Permissive List of Allowed InputsX3 - Medium
201Information Exposure Through Sent DataX2 - Low
209Information Exposure Through an Error MessageX2 - Low
215Information Exposure Through Debug InformationX2 - Low
242Use of Inherently Dangerous FunctionX5 - Very High
252Unchecked Return ValueX2 - Low
256Unprotected Storage of CredentialsX3 - Medium
259Use of Hard-coded PasswordX3 - Medium
287Improper AuthenticationX4 - High
296Improper Following of a Certificate's Chain of Trust 3 - Medium
297Improper Validation of Certificate with Host MismatchX3 - Medium
311Missing Encryption of Sensitive DataX3 - Medium
312Cleartext Storage of Sensitive InformationX3 - Medium
313Cleartext Storage in a File or on DiskX3 - Medium
316Cleartext Storage of Sensitive Information in MemoryX3 - Medium
319Cleartext Transmission of Sensitive InformationX3 - Medium
321Use of Hard-coded Cryptographic KeyX3 - Medium
326Inadequate Encryption StrengthX3 - Medium
327Use of a Broken or Risky Cryptographic AlgorithmX3 - Medium
329Not Using a Random IV with CBC ModeX2 - Low
331Insufficient EntropyX3 - Medium
345Insufficient Verification of Data AuthenticityX4 - High
347Improper Verification of Cryptographic SignatureX2 - Low
354Improper Validation of Integrity Check ValueX3 - Medium
377Insecure Temporary FileX3 - Medium
378Creation of Temporary File With Insecure Permissions 3 - Medium
404Improper Resource ShutdownX0 - Informational
415Double FreeX3 - Medium
416Use After FreeX2 - Low
470Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection)X3 - Medium
489Leftover Debug CodeX3 - Medium
497Exposure of System Data to an Unauthorized Control SphereX2 - Low
501Trust Boundary ViolationX3 - Medium
506Embedded Malicious CodeX4 - High
511Logic/Time BombX5 - Very High
514Covert ChannelX2 - Low
522Insufficiently Protected CredentialsX3 - Medium
601URL Redirection to Untrusted SiteX3 - Medium
614Sensitive Cookie without Secure AttributeX2 - Low
676Use of Potentially Dangerous FunctionX3 - Medium
693Protection Mechanism FailureX3 - Medium
732Incorrect Permission Assignment for Critical ResourceX3 - Medium
757Selection of Less Secure Algorithm During NegotiationX3 - Medium
798Use of Hard-coded CredentialsX3 - Medium

The Auto-Update CWE Top 25 standard

The following table lists all the CWEs that might cause an application to not pass a policy that includes the Auto-Update CWE Top 25 policy rule.

CWE IDCWE nameStatic supportDynamic supportVeracode severity
20Improper Input ValidationX 0 - Informational
22Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)XX3 - Medium
23Relative Path Traversal   
73External Control of File Name or PathX 3 - Medium
77Improper Neutralization of Special Elements used in a Command ('Command Injection')X5 - Very High
78Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)XX5 - Very High
79Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)XX3 - Medium
80Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)XX3 - Medium
81Improper Neutralization of Script in an Error Message Web Page 3 - Medium
83Improper Neutralization of Script in Attributes in a Web Page X3 - Medium
86Improper Neutralization of Invalid Characters in Identifiers in Web PagesX 3 - Medium
89Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)XX4 - High
90Improper Neutralization of Special Elements used in an LDAP Query (LDAP Injection)X 3 - Medium
91XML Injection (aka Blind XPath Injection)XX3 - Medium
94Improper Control of Generation of Code (Code Injection)X 3 - Medium
95Improper Neutralization of Directives in Dynamically Evaluated Code (Eval Injection)XX5 - Very High
98Improper Control of Filename for Include/Require Statement in PHP Program (PHP Remote File Inclusion)XX4 - High
103Struts: Incomplete validate() Method DefinitionX 3 - Medium
104Struts: Form Bean Does Not Extend Validation ClassX 3 - Medium
112Missing XML ValidationX 3 - Medium
119Improper Restriction of Operations within the Bounds of a Memory Buffer   
120Buffer Copy without Checking Size of Input (Classic Buffer Overflow) 5 - Very High
121Stack-based Buffer OverflowX 5 - Very High
125Out-of-bounds ReadX 3 - Medium
131Incorrect Calculation of Buffer Size   
135Incorrect Calculation of Multi-Byte String LengthX 5 - Very High
185Incorrect Regular ExpressionX 2 - Low
190Integer Overflow or WraparoundX 5 - Very High
200Exposure of Sensitive Information to an Unauthorized ActorXX2 - Low
201Insertion of Sensitive Information Into Sent DataX 2 - Low
209Generation of Error Message Containing Sensitive InformationXX2 - Low
215Insertion of Sensitive Information Into Debugging CodeXX2 - Low
259Use of Hard-coded PasswordXX3 - Medium
269Improper Privilege Management 3 - Medium
272Least Privilege ViolationX3 - Medium
285Improper AuthorizationXX3 - Medium
287Improper AuthenticationXX4 - High
306Missing Authentication for Critical Function 3 - Medium
321Use of Hard-coded Cryptographic KeyXX3 - Medium
346Origin Validation ErrorX 3 - Medium
350Reliance on Reverse DNS Resolution for a Security-Critical ActionX 3 - Medium
352Cross-Site Request Forgery (CSRF)XX3 - Medium
359Exposure of Private Personal Information to an Unauthorized ActorX2 - Low
400Uncontrolled Resource Consumption2 - Low
416Use After FreeX 2 - Low
434Unrestricted Upload of File with Dangerous Type X4 - High
470Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection)X 3 - Medium
476NULL Pointer Dereference  2 - Low
497Exposure of Sensitive System Information to an Unauthorized Control SphereX 2 - Low
498Cloneable Class Containing Sensitive InformationX 2 - Low
502Deserialization of Untrusted DataX 3 - Medium
526Exposure of Sensitive Information Through Environmental Variables X2 - Low
530Exposure of Backup File to an Unauthorized Control Sphere X2 - Low
538Insertion of Sensitive Information into Externally-Accessible File or Directory X2 - Low
548Information Exposure Through Directory Listing X2 - Low
564SQL Injection: HibernateX 4 - High
566Authorization Bypass Through User-Controlled SQL Primary KeyX3 - Medium
601URL Redirection to Untrusted Site (Open Redirect)XX3 - Medium
615Inclusion of Sensitive Information in Source Code CommentsXX0 - Informational
618Exposed Unsafe ActiveX MethodX 5 - Very High
639Authorization Bypass Through User-Controlled KeyX4 - High
665Improper InitializationX2 - Low
693Protection Mechanism FailureXX3 - Medium
708Incorrect Ownership AssignmentX4 - High
787Out-of-bounds WriteX 3 - Medium
798Use of Hard-coded CredentialsX 3 - Medium
830Inclusion of Web Functionality from an Untrusted Source X2 - Low
862Missing Authorization   
863Incorrect Authorization   
915Improperly Controlled Modification of Dynamically-Determined Object AttributesX 3 - Medium
918Server-Side Request Forgery (SSRF)XX3 - Medium
942Permissive Cross-domain Policy with Untrusted DomainsXX3 - Medium
1174ASP.NET Misconfiguration: Improper Model ValidationX 2 - Low

The 2020 CWE Top 25 standard

The following table lists all the CWEs that might cause an application to not pass a policy that includes the 2020 CWE Top 25 policy rule.

CWE IDCWE nameStatic supportDynamic supportVeracode severity
20Improper Input ValidationX 0 - Informational
22Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)XX3 - Medium
23Relative Path Traversal   
73External Control of File Name or PathX 3 - Medium
78Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)XX5 - Very High
79Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)XX3 - Medium
80Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)XX3 - Medium
81Improper Neutralization of Script in an Error Message Web Page   
83Improper Neutralization of Script in Attributes in a Web Page X3 - Medium
86Improper Neutralization of Invalid Characters in Identifiers in Web PagesX 3 - Medium
89Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)XX4 - High
90Improper Neutralization of Special Elements used in an LDAP Query (LDAP Injection)X 3 - Medium
91XML Injection (aka Blind XPath Injection)XX3 - Medium
94Improper Control of Generation of Code (Code Injection)X 3 - Medium
95Improper Neutralization of Directives in Dynamically Evaluated Code (Eval Injection)XX5 - Very High
98Improper Control of Filename for Include/Require Statement in PHP Program (PHP Remote File Inclusion)XX4 - High
100DEPRECATED: Technology-Specific Input Validation Problems   
103Struts: Incomplete validate() Method DefinitionX 3 - Medium
104Struts: Form Bean Does Not Extend Validation ClassX 3 - Medium
112Missing XML ValidationX 3 - Medium
119Improper Restriction of Operations within the Bounds of a Memory Buffer   
120Buffer Copy without Checking Size of Input (Classic Buffer Overflow)   
121Stack-based Buffer OverflowX 5 - Very High
125Out-of-bounds ReadX 3 - Medium
131Incorrect Calculation of Buffer Size   
135Incorrect Calculation of Multi-Byte String LengthX 5 - Very High
185Incorrect Regular ExpressionX 2 - Low
190Integer Overflow or WraparoundX 5 - Very High
200Exposure of Sensitive Information to an Unauthorized ActorXX2 - Low
201Insertion of Sensitive Information Into Sent DataX 2 - Low
209Generation of Error Message Containing Sensitive InformationXX2 - Low
215Insertion of Sensitive Information Into Debugging CodeXX2 - Low
259Use of Hard-coded PasswordXX3 - Medium
269Improper Privilege Management   
272Least Privilege ViolationX 3 - Medium
274Improper Handling of Insufficient PrivilegesX 0 - Informational
285Improper AuthorizationXX3 - Medium
287Improper AuthenticationXX4 - High
306Missing Authentication for Critical Function   
321Use of Hard-coded Cryptographic KeyXX3 - Medium
346Origin Validation ErrorX 3 - Medium
350Reliance on Reverse DNS Resolution for a Security-Critical ActionX 3 - Medium
352Cross-Site Request Forgery (CSRF)XX3 - Medium
359Exposure of Private Personal Information to an Unauthorized ActorX 2 - Low
400Uncontrolled Resource Consumption   
416Use After FreeX 2 - Low
434Unrestricted Upload of File with Dangerous Type X4 - High
470Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection)X 3 - Medium
476NULL Pointer Dereference   
497Exposure of Sensitive System Information to an Unauthorized Control SphereX 2 - Low
498Cloneable Class Containing Sensitive Information   
502Deserialization of Untrusted DataX 3 - Medium
522Insufficiently Protected CredentialsXX3 - Medium
526Exposure of Sensitive Information Through Environmental Variables X2 - Low
530Exposure of Backup File to an Unauthorized Control Sphere X2 - Low
538Insertion of Sensitive Information into Externally-Accessible File or Directory X0 - Informational
548Exposure of Information Through Directory Listing X2 - Low
564SQL Injection: HibernateX 4 - High
566Authorization Bypass Through User-Controlled SQL Primary KeyX 3 - Medium
601URL Redirection to Untrusted Site (Open Redirect)XX3 - Medium
611Improper Restriction of XML External Entity ReferenceXX3 - Medium
615Inclusion of Sensitive Information in Source Code CommentsXX0 - Informational
618Exposed Unsafe ActiveX MethodX 5 - Very High
639Authorization Bypass Through User-Controlled KeyX 4 - High
665Improper InitializationX 2 - Low
693Protection Mechanism FailureXX3 - Medium
708Incorrect Ownership AssignmentX 4 - High
732Incorrect Permission Assignment for Critical ResourceX 3 - Medium
787Out-of-bounds WriteX 3 - Medium
798Use of Hard-coded CredentialsX 3 - Medium
830Inclusion of Web Functionality from an Untrusted Source X2 - Low
862Missing Authorization   
915Improperly Controlled Modification of Dynamically-Determined Object AttributesX 3 - Medium
918Server-Side Request Forgery (SSRF)XX3 - Medium
942Permissive Cross-domain Policy with Untrusted DomainsXX3 - Medium
1174ASP.NET Misconfiguration: Improper Model ValidationX 2 - Low

The 2019 CWE Top 25 standard

The following table lists all the CWEs that might cause an application to not pass a policy that includes the 2019 CWE Top 25 policy rule.

CWE IDCWE nameStatic supportDynamic supportVeracode severity
20Improper Input ValidationX 0 - Informational
22Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)XX3 - Medium
23Relative Path Traversal   
73External Control of File Name or PathX 3 - Medium
78Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)XX5 - Very High
79Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)XX3 - Medium
80Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)XX3 - Medium
81Improper Neutralization of Script in an Error Message Web Page   
83Improper Neutralization of Script in Attributes in a Web Page X3 - Medium
86Improper Neutralization of Invalid Characters in Identifiers in Web PagesX 3 - Medium
89Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)XX4 - High
90Improper Neutralization of Special Elements used in an LDAP Query (LDAP Injection)X 3 - Medium
91XML Injection (aka Blind XPath Injection)XX3 - Medium
94Improper Control of Generation of Code (Code Injection)X 3 - Medium
95Improper Neutralization of Directives in Dynamically Evaluated Code (Eval Injection)XX5 - Very High
98Improper Control of Filename for Include/Require Statement in PHP Program (PHP Remote File Inclusion)XX4 - High
100DEPRECATED: Technology-Specific Input Validation Problems   
103Struts: Incomplete validate() Method DefinitionX 3 - Medium
104Struts: Form Bean Does Not Extend Validation ClassX 3 - Medium
112Missing XML ValidationX 3 - Medium
119Improper Restriction of Operations within the Bounds of a Memory Buffer   
120Buffer Copy without Checking Size of Input (Classic Buffer Overflow)   
121Stack-based Buffer OverflowX 5 - Very High
125Out-of-bounds ReadX 3 - Medium
131Incorrect Calculation of Buffer Size   
135Incorrect Calculation of Multi-Byte String LengthX 5 - Very High
185Incorrect Regular ExpressionX 2 - Low
190Integer Overflow or WraparoundX 5 - Very High
200Exposure of Sensitive Information to an Unauthorized ActorXX2 - Low
201Insertion of Sensitive Information Into Sent DataX 2 - Low
209Generation of Error Message Containing Sensitive InformationXX2 - Low
215Insertion of Sensitive Information Into Debugging CodeXX2 - Low
259Use of Hard-coded PasswordXX3 - Medium
269Improper Privilege Management   
272Least Privilege ViolationX 3 - Medium
274Improper Handling of Insufficient PrivilegesX 0 - Informational
285Improper AuthorizationXX3 - Medium
287Improper AuthenticationXX4 - High
295Improper Certificate ValidationX 3 - Medium
321Use of Hard-coded Cryptographic KeyXX3 - Medium
346Origin Validation ErrorX 3 - Medium
350Reliance on Reverse DNS Resolution for a Security-Critical ActionX 3 - Medium
352Cross-Site Request Forgery (CSRF)XX3 - Medium
359Exposure of Private Personal Information to an Unauthorized ActorX 2 - Low
400Uncontrolled Resource Consumption   
404Improper Resource Shutdown or ReleaseX 0 - Informational
416Use After FreeX 2 - Low
426Untrusted Search PathX 3 - Medium
427Uncontrolled Search Path ElementX 3 - Medium
434Unrestricted Upload of File with Dangerous Type X4 - High
470Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection)X 3 - Medium
476NULL Pointer Dereference   
497Exposure of Sensitive System Information to an Unauthorized Control SphereX 2 - Low
498Cloneable Class Containing Sensitive Information   
502Deserialization of Untrusted DataX 3 - Medium
526Exposure of Sensitive Information Through Environmental Variables X2 - Low
530Exposure of Backup File to an Unauthorized Control Sphere X2 - Low
538Insertion of Sensitive Information into Externally-Accessible File or Directory X0 - Informational
548Exposure of Information Through Directory Listing X2 - Low
564SQL Injection: HibernateX 4 - High
566Authorization Bypass Through User-Controlled SQL Primary KeyX 3 - Medium
601URL Redirection to Untrusted Site (Open Redirect)XX3 - Medium
611Improper Restriction of XML External Entity ReferenceXX3 - Medium
615Inclusion of Sensitive Information in Source Code CommentsXX0 - Informational
618Exposed Unsafe ActiveX MethodX 5 - Very High
639Authorization Bypass Through User-Controlled KeyX 4 - High
665Improper InitializationX 2 - Low
693Protection Mechanism FailureXX3 - Medium
708Incorrect Ownership AssignmentX 4 - High
732Incorrect Permission Assignment for Critical ResourceX 3 - Medium
772Missing Release of Resource after Effective Lifetime   
787Out-of-bounds WriteX 3 - Medium
798Use of Hard-coded CredentialsX 3 - Medium
830Inclusion of Web Functionality from an Untrusted Source X2 - Low
915Improperly Controlled Modification of Dynamically-Determined Object AttributesX 3 - Medium
918Server-Side Request Forgery (SSRF)XX3 - Medium
942Permissive Cross-domain Policy with Untrusted DomainsXX3 - Medium
1174ASP.NET Misconfiguration: Improper Model ValidationX 2 - Low

The CERT standard

The following table lists all the CWEs that might cause an application to not pass a policy that includes a CERT policy rule.

CWE IDCWE nameStatic supportDynamic supportVeracode severity
14Compiler Removal of Code to Clear Buffers   
20Improper Input ValidationX 0 - Informational
22Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)XX3 - Medium
37Path Traversal: '/absolute/pathname/here'   
38Path Traversal: '\absolute\pathname\here'   
39Path Traversal: 'C:dirname'   
41Improper Resolution of Path Equivalence   
59Improper Link Resolution Before File Access (Link Following)   
62UNIX Hard Link   
64Windows Shortcut Following (.LNK)   
65Windows Hard Link   
67Improper Handling of Windows Device Names   
78Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)XX5 - Very High
88Argument Injection or ModificationX 3 - Medium
111Direct Use of Unsafe JNIX 4 - High
116Improper Encoding or Escaping of Output   
117Improper Output Neutralization for LogsX 3 - Medium
119Improper Restriction of Operations within the Bounds of a Memory Buffer   
120Buffer Copy without Checking Size of Input (Classic Buffer Overflow)   
121Stack-based Buffer OverflowX 5 - Very High
122Heap-based Buffer Overflow   
123Write-what-where Condition   
125Out-of-bounds ReadX 3 - Medium
128Wrap-around Error   
129Improper Validation of Array IndexX 3 - Medium
131Incorrect Calculation of Buffer Size   
134Use of Externally-Controlled Format StringX 5 - Very High
135Incorrect Calculation of Multi-Byte String LengthX 5 - Very High
144Improper Neutralization of Line Delimiters   
150Improper Neutralization of Escape, Meta, or Control Sequences   
170Improper Null TerminationX 3 - Medium
171Cleansing, Canonicalization, and Comparison Errors   
176Improper Handling of Unicode Encoding   
180Incorrect Behavior Order: Validate Before Canonicalize   
182Collapse of Data into Unsafe Value   
190Integer Overflow or WraparoundX 5 - Very High
191Integer Underflow (Wrap or Wraparound)X 3 - Medium
192Integer Coercion ErrorX 3 - Medium
193Off-by-one ErrorX 3 - Medium
194Unexpected Sign Extension   
195Signed to Unsigned Conversion ErrorX 3 - Medium
197Numeric Truncation ErrorX 3 - Medium
198Use of Incorrect Byte Ordering   
209Information Exposure Through an Error MessageXX2 - Low
226Sensitive Information Uncleared Before Release   
2277PK - API Abuse   
230Improper Handling of Missing Values   
232Improper Handling of Undefined Values   
241Improper Handling of Unexpected Data Type   
242Use of Inherently Dangerous FunctionX 5 - Very High
244Improper Clearing of Heap Memory Before Release (Heap Inspection)   
248Uncaught ExceptionX 2 - Low
250Execution with Unnecessary Privileges   
252Unchecked Return ValueX 2 - Low
253Incorrect Check of Function Return Value   
259Use of Hard-coded PasswordXX3 - Medium
266Incorrect Privilege Assignment   
272Least Privilege ViolationX 3 - Medium
273Improper Check for Dropped PrivilegesX 3 - Medium
276Incorrect Default Permissions   
279Incorrect Execution-Assigned Permissions   
289Authentication Bypass by Alternate Name   
300Channel Accessible by Non-Endpoint (Man-in-the-Middle)   
302Authentication Bypass by Assumed-Immutable Data   
311Missing Encryption of Sensitive DataX 3 - Medium
319Cleartext Transmission of Sensitive InformationX 3 - Medium
327Use of a Broken or Risky Cryptographic AlgorithmXX3 - Medium
330Use of Insufficiently Random ValuesX 3 - Medium
331Insufficient EntropyX 3 - Medium
332Insufficient Entropy in PRNG   
333Improper Handling of Insufficient Entropy in TRNG   
336Same Seed in Pseudo-Random Number Generator (PRNG)   
337Predictable Seed in Pseudo-Random Number Generator (PRNG)   
338Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)X 3 - Medium
347Improper Verification of Cryptographic SignatureX 2 - Low
349Acceptance of Extraneous Untrusted Data With Trusted Data   
359Exposure of Private Information (Privacy Violation)X 2 - Low
362Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)   
363Race Condition Enabling Link Following   
366Race Condition within a ThreadX 3 - Medium
367Time-of-check Time-of-use (TOCTOU) Race ConditionX 3 - Medium
369Divide By Zero   
374Passing Mutable Objects to an Untrusted Method   
375Returning a Mutable Object to an Untrusted Caller   
377Insecure Temporary FileX 3 - Medium
379Creation of Temporary File in Directory with Incorrect Permissions   
382J2EE Bad Practices: Use of System.exit()X 2 - Low
390Detection of Error Condition Without Action   
392Missing Report of Error Condition   
395Use of NullPointerException Catch to Detect NULL Pointer Dereference   
397Declaration of Throws for Generic Exception   
400Uncontrolled Resource Consumption   
401Improper Release of Memory Before Removing Last ReferenceX 2 - Low
403Exposure of File Descriptor to Unintended Control Sphere (File Descriptor Leak)   
404Improper Resource Shutdown or ReleaseX 0 - Informational
405Asymmetric Resource Consumption (Amplification)   
409Improper Handling of Highly Compressed Data (Data Amplification)   
410Insufficient Resource Pool   
412Unrestricted Externally Accessible Lock   
413Improper Resource Locking   
415Double FreeX 3 - Medium
416Use After FreeX 2 - Low
426Untrusted Search PathX 3 - Medium
456Missing Initialization of a Variable   
459Incomplete Cleanup   
460Improper Cleanup on Thrown Exception   
462Duplicate Key in Associative List (Alist)   
464Addition of Data Structure Sentinel   
466Return of Pointer Value Outside of Expected Range   
467Use of sizeof() on a Pointer Type   
468Incorrect Pointer Scaling   
469Use of Pointer Subtraction to Determine Size   
470Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection)X 3 - Medium
476NULL Pointer Dereference   
479Signal Handler Use of a Non-reentrant FunctionX 3 - Medium
480Use of Incorrect Operator   
481Assigning instead of Comparing   
482Comparing instead of Assigning   
486Comparison of Classes by Name   
487Reliance on Package-level Scope   
491Public cloneable() Method Without Final (Object Hijack)   
492Use of Inner Class Containing Sensitive Data   
493Critical Public Variable Without Final Modifier   
494Download of Code Without Integrity Check   
497Exposure of System Data to an Unauthorized Control SphereX 2 - Low
498Cloneable Class Containing Sensitive Information   
499Serializable Class Containing Sensitive Data   
500Public Static Field Not Marked Final   
502Deserialization of Untrusted DataX 3 - Medium
528Exposure of Core Dump File to an Unauthorized Control Sphere   
532Insertion of Sensitive Information into Log FileX 2 - Low
543Use of Singleton Pattern Without Synchronization in a Multithreaded Context   
544Missing Standardized Error Handling Mechanism   
547Use of Hard-coded, Security-relevant ConstantsX 3 - Medium
552Files or Directories Accessible to External Parties   
561Dead Code   
562Return of Stack Variable Address   
563Assignment to Variable without Use   
567Unsynchronized Access to Shared Data in a Multithreaded Context   
568finalize() Method Without super.finalize()   
570Expression is Always False   
571Expression is Always True   
572Call to Thread run() instead of start()   
573Improper Following of Specification by Caller   
581Object Model Violation: Just One of Equals and Hashcode Defined   
582Array Declared Public, Final, and Static   
583finalize() Method Declared Public   
584Return Inside Finally Block   
586Explicit Call to Finalize()   
587Assignment of a Fixed Address to a Pointer   
589Call to Non-ubiquitous API   
590Free of Memory not on the Heap   
591Sensitive Data Storage in Improperly Locked Memory   
595Comparison of Object References Instead of Object Contents   
597Use of Wrong Operator in String ComparisonX 2 - Low
600Uncaught Exception in Servlet   
606Unchecked Input for Loop Condition   
609Double-Checked Locking   
617Reachable Assertion   
625Permissive Regular Expression   
628Function Call with Incorrectly Specified ArgumentsX 2 - Low
647Use of Non-Canonical URL Paths for Authorization Decisions   
662Improper Synchronization   
664Improper Control of a Resource Through its Lifetime   
665Improper InitializationX 2 - Low
666Operation on Resource in Wrong Phase of Lifetime   
667Improper Locking   
672Operation on a Resource after Expiration or Release   
675Duplicate Operations on ResourceX 2 - Low
676Use of Potentially Dangerous FunctionX 3 - Medium
680Integer Overflow to Buffer Overflow   
681Incorrect Conversion between Numeric Types   
682Incorrect Calculation   
684Incorrect Provision of Specified Functionality   
685Function Call With Incorrect Number of Arguments   
686Function Call With Incorrect Argument Type   
687Function Call With Incorrectly Specified Argument Value   
690Unchecked Return Value to NULL Pointer Dereference   
696Incorrect Behavior Order   
697Incorrect Comparison   
703Improper Check or Handling of Exceptional Conditions   
704Incorrect Type Conversion or Cast   
705Incorrect Control Flow Scoping   
732Incorrect Permission Assignment for Critical ResourceX 3 - Medium
754Improper Check for Unusual or Exceptional Conditions   
758Reliance on Undefined, Unspecified, or Implementation-Defined Behavior   
762Mismatched Memory Management Routines   
766Critical Data Element Declared Public   
770Allocation of Resources Without Limits or Throttling   
771Missing Reference to Active Allocated Resource   
772Missing Release of Resource after Effective Lifetime   
773Missing Reference to Active File Descriptor or Handle   
775Missing Release of File Descriptor or Handle after Effective Lifetime   
783Operator Precedence Logic Error   
786Access of Memory Location Before Start of Buffer   
789Uncontrolled Memory Allocation   
798Use of Hard-coded CredentialsX 3 - Medium
805Buffer Access with Incorrect Length Value   
807Reliance on Untrusted Inputs in a Security Decision   
820Missing Synchronization   
833Deadlock   
838Inappropriate Encoding for Output Context   
843Access of Resource Using Incompatible Type (Type Confusion)   
908Use of Uninitialized Resource   
910Use of Expired File Descriptor   

OWASP 2023 API Security Top 10 support

The following table describes which categories in the OWASP 2023 API Security Top 10 that Veracode supports for Dynamic Analysis and DAST Essentials.

CategoryDescriptionDynamic AnalysisDAST Essentials
API1:2023Broken Object Level AuthorizationPartial support (fuzzing paths)Partial support (fuzzing paths)
API2:2023Broken AuthenticationFull supportFull support
API3:2023Broken Object Level Authorization**
API4:2023Unrestricted Resource Consumption**
API5:2023Broken Functiopn Level Authorization**
API6:2023Unrestricted Access to Sensitive Business Flows**
API7:2023Server Side Request ForgeryFull supportFull support
API8:2023Security MisconfigurationFull supportFull support
API9:2023Improper Inventory ManagementPartial supportPartial support
API10:2023Unsafe Consumption of APIs**
  • Veracode Dynamic Analysis and DAST Essentials might provide inaccurate results for these categories. For accurate results, Veracode recommends that you test these categories with Manual Penetration Testing (MPT).