iOS Objective C
This article covers iOS Objective C support and vulnerability detection for Mend SAST.
Mend SAST-supported iOS Objective C file types
Note: ‘Secondary’ file extensions will only be scanned if at least one file with any of the other ‘Primary’ file extensions is present to identify the language as the relevant language.
File Type | Extension Type |
---|---|
.h | Secondary |
.m | Primary |
Mend SAST-supported iOS Objective C frameworks
Framework |
---|
N/A |
Mend SAST-supported Java vulnerability types
The iOS Objective C vulnerability types detected by SAST are provided below and are organized by CWE ID within each of their identified severities.
iOS Objective C high-severity vulnerability types
CWE | Vulnerability Type |
CWE-73 | File Manipulation |
CWE-89 | SQL Functions |
iOS Objective C medium-severity vulnerability types
CWE | Vulnerability Type |
CWE-200 | Location Information |
CWE-200 | Insecure Data Storage |
CWE-209 | Log Messages |
CWE-319 | Insufficient Transport Layer Protection |
CWE-676 | Miscellaneous Dangerous Functions |
CWE-749 | WebView Implementation |
iOS Objective C low-severity vulnerability types
CWE | Vulnerability Type |
CWE-242 | Use of Inherently Dangerous Function |
CWE-326 | Weak Encryption Strength |
CWE-676 | External URL Access |