Home / Resources / Vulnerability Database

DerScanner Vulnerability Database

Discover the vulnerabilities DerScanner can help you mitigate

Severity

Programming language

VULNERABILITY
Language
CWE
T-SQL : Weak encryption algorithm
T-SQL
CWE-327 CWE-1032
T-SQL : Weak hashing algorithm
T-SQL
CWE-328
T-SQL : Weak random number generator
T-SQL
CWE-330 CWE-338
T-SQL : Incorrect comparison with NULL
T-SQL
CWE-480 CWE-754
T-SQL : Date conversion
T-SQL
N/A
T-SQL : Null encryption key
T-SQL
CWE-321
T-SQL : SQL injection
T-SQL
CWE-20 CWE-89 CWE-1027
T-SQL : Insecure GRANT usage
T-SQL
CWE-266 CWE-1033
T-SQL : Default account
T-SQL
CWE-1031
T-SQL : DOS attack possible
T-SQL
CWE-400
T-SQL : Use of TOP without ORDER BY
T-SQL
N/A
T-SQL : Insecure function
T-SQL
CWE-242 CWE-676
T-SQL : Error handling: empty catch block
T-SQL
CWE-390
T-SQL : Hardcoded password
T-SQL
CWE-256 CWE-257 CWE-259 CWE-522 CWE-656 CWE-798 CWE-862 CWE-1028 CWE-1032
T-SQL : Undocumented feature: special account
T-SQL
CWE-506 CWE-798 CWE-862
T-SQL : Command injection (job)
T-SQL
CWE-20 CWE-77 CWE-78 CWE-1027
T-SQL : Empty password
T-SQL
CWE-257 CWE-259 CWE-522 CWE-1028 CWE-1032
T-SQL : Undocumented feature: network activity
T-SQL
CWE-506 CWE-510
T-SQL : Undocumented feature: hidden functionality
T-SQL
CWE-506 CWE-912
T-SQL : Cookie: broad path
T-SQL
CWE-1028
Get Started

Get Started Today and Supercharge
Your Projects!

Stay organized, collaborate seamlessly, and deliver projects faster with Protask

dashboard