logo

Database

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

  1. /

  2. Home
  3. /

  4. Requirements
  5. /

  6. Source

Source

152. Reuse database connections173. Discard unsafe inputs154. Eliminate backdoors174. Transactions without a distinguishable pattern155. Application free of malicious code175. Protect pages from clickjacking156. Source code without sensitive information302. Declare dependencies explicitly158. Use a secure programming language323. Exclude unverifiable files159. Obfuscate code337. Make critical logic flows thread safe160. Encode system outputs342. Validate request parameters161. Define secure default options344. Avoid dynamic code execution164. Use optimized structures345. Establish protections against overflows167. Close unused resources359. Avoid using generic exceptions168. Initialize variables explicitly366. Associate type to variables169. Use parameterized queries379. Keep low McCabe cyclomatic complexity172. Encrypt connection strings381. Use of absolute paths