181 | | |
| 181 | * {{{mods.unsecure_calls}}} -- Lists all the possible vulnerabilities |
| 182 | |
| 183 | * {{{mods.unsecure_interoperability}}} -- Lists interoperability related weaknesses |
| 184 | |
| 185 | * {{{mods.unsecure_concurrency}}} -- Identifies concurrency related issues |
| 186 | |
| 187 | * {{{mods.unsecure_os_call}}} -- Checks for OS injection |
| 188 | |
| 189 | * {{{mods.unsecure_port_creation}}} -- Identifies port creation related issues |
| 190 | |
| 191 | * {{{mods.unsecure_file_operation}}} -- Lists unsecure file handling |
| 192 | |
| 193 | * {{{mods.unstable_call}}} -- Shows possible atom exhaustion |
| 194 | |
| 195 | * {{{mods.nif_calls}}} -- Identifies unsecure NIF calls |
| 196 | |
| 197 | * {{{mods.unsecure_port_drivers}}} -- Lists the unsecure ddll usage |
| 198 | |
| 199 | * {{{mods.decommissioned_crypto}}} -- Lists the legacy functions from crypto module |
| 200 | |
| 201 | * {{{mods.unsecure_compile_operations}}} -- Shows unsecure compile/code loading related operations |
| 202 | |
| 203 | * {{{mods.unsecure_process_linkage}}} -- Lists unsecure process linkage |
| 204 | |
| 205 | * {{{mods.unsecure_prioritization}}} -- Identifies unsecure process prioritization |
| 206 | |
| 207 | * {{{mods.unsecure_ets_traversal}}} -- Lists unsecure ETS traversal |
| 208 | |
| 209 | * {{{mods.unsafe_network}}} -- Checks for unsecure kernel related operations |
| 210 | |
| 211 | * {{{mods.unsecure_xml_usage}}} -- Identifies unsecure xml parsing |
| 212 | |
| 213 | * {{{mods.unsecure_communication}}} -- Lists unsecure communication related settings |