Dart Fixes
- 102 – Email uniqueness not properly verified
- 106 – NoSQL injection
- 108 – Improper control of interaction frequency
- 113 – Improper type assignation
- 115 – Security controls bypass or absence
- 118 – Regulation infringement
- 119 – Metadata with sensitive information
- 120 – Improper dependency pinning
- 124 – Race condition
- 127 – Lack of data validation - Type confusion
- 128 – Insecurely generated cookies - HttpOnly
- 129 – Insecurely generated cookies - SameSite
- 130 – Insecurely generated cookies - Secure
- 132 – Insecure or unset HTTP headers - X-Content-Type-Options
- 133 – Insecure encryption algorithm - Perfect Forward Secrecy
- 134 – Insecure or unset HTTP headers - CORS
- 137 – Insecure or unset HTTP headers - X-Permitted-Cross-Domain-Policies
- 138 – Inappropriate coding practices
- 140 – Insecure exceptions - Empty or no catch
- 141 – Lack of data validation - URL
- 142 – Sensitive information in source code - API Key
- 143 – Inappropriate coding practices - Eval function
- 145 – Inappropriate coding practices - Cyclomatic complexity
- 147 – Insecure encryption algorithm - SSLContext
- 150 – Use of an insecure channel - useSslProtocol()
- 153 – Insecure or unset HTTP headers - Accept
- 156 – Uncontrolled external site redirect
- 160 – Excessive privileges - Temporary Files
- 164 – Insecure service configuration
- 169 – Insecure service configuration - Keys
- 183 – Debugging enabled in production
- 184 – Lack of data validation
- 185 – Lack of data validation - Header x-amzn-RequestId
- 187 – Lack of data validation - Source Code
- 190 – Lack of data validation - Session Cookie
- 191 – Lack of data validation - Responses
- 192 – Lack of data validation - Reflected Parameters
- 194 – Lack of data validation - Input Length
- 195 – Lack of data validation - Headers
- 196 – Lack of data validation - Dates
- 197 – Lack of data validation - Numbers
- 199 – Lack of data validation - Emails
- 201 – Unauthorized access to files
- 204 – Insufficient data authenticity validation
- 211 – Asymmetric denial of service - ReDoS
- 213 – Business information leak - JWT
- 216 – Business information leak - Source Code
- 217 – Business information leak - Credit Cards
- 220 – Business information leak - Token
- 222 – Business information leak - DB
- 226 – Business information leak - Personal Information
- 230 – Business information leak - Firestore
- 233 – Incomplete funcional code
- 234 – Technical information leak - Stacktrace
- 236 – Technical information leak - SourceMap
- 237 – Technical information leak - Print Functions
- 240 – Authentication mechanism absence or evasion - OTP
- 243 – Authentication mechanism absence or evasion - Admin Console
- 246 – Non-encrypted confidential information - DB
- 248 – Non-encrypted confidential information - LDAP
- 249 – Non-encrypted confidential information - Credentials
- 254 – Automatic information enumeration - Credit Cards
- 269 – Insecure encryption algorithm - Blowfish
- 270 – Insecure functionality - File Creation
- 271 – Insecure functionality - Password management
- 272 – Insecure functionality - Masking
- 273 – Insecure functionality - Fingerprint
- 275 – Non-encrypted confidential information - Local data
- 276 – Sensitive information sent via URL parameters - Session
- 278 – Insecure exceptions - NullPointerException
- 282 – Insecure encryption algorithm - ECB
- 283 – Automatic information enumeration - Personal Information
- 286 – Insecure object reference - Personal information
- 288 – Insecure object reference - Financial information
- 294 – Insecure service configuration - OTP
- 295 – Insecure session management - Change Password
- 298 – Authentication mechanism absence or evasion - Redirect
- 302 – Insecure functionality - Session management
- 305 – Security controls bypass or absence - Data creation
- 306 – Insecure object reference - Files
- 307 – Insecure object reference - Data
- 308 – Enabled default configuration
- 309 – Insecurely generated token - JWT
- 313 – Insecure service configuration - Certificates
- 317 – Improper resource allocation - Memory leak
- 318 – Insecurely generated token - Validation
- 319 – Insecure service configuration - Roles
- 321 – Lack of data validation - HTML code
- 322 – Insecurely generated token - Lifespan
- 324 – Insecure functionality - User management
- 326 – Sensitive information in source code - Dependencies
- 327 – Insufficient data authenticity validation - Images
- 328 – Insecure object reference - Session management
- 329 – Insecure or unset HTTP headers - Content-Type
- 330 – Lack of protection against brute force attacks - Credentials
- 332 – Use of insecure channel - Source code
- 337 – Insecure session management - CSRF Fixation
- 339 – Insecure service configuration - Request Validation
- 340 – Lack of data validation - Special Characters
- 341 – Lack of data validation - OTP
- 344 – Lack of data validation - Non Sanitized Variables
- 345 – Security controls bypass or absence - Session Invalidation
- 353 – Lack of data validation - Token
- 354 – Insecure file upload - Files Limit
- 355 – Insufficient data authenticity validation - Checksum verification
- 359 – Sensitive information in source code - Credentials
- 365 – Authentication mechanism absence or evasion - Response tampering
- 369 – Insecure object reference - User deletion
- 372 – Use of an insecure channel - HTTP
- 378 – Non-encrypted confidential information - Hexadecimal
- 383 – Insecurely generated token - OTP
- 384 – Inappropriate coding practices - Wildcard export
- 385 – Non-encrypted confidential information - Keys
- 387 – Insecure service configuration - Object Reutilization
- 391 – Inappropriate coding practices - Unused properties
- 393 – Use of software with known vulnerabilities in development
- 395 – Insecure generation of random numbers - Static IV
- 410 – Dependency Confusion
- 414 – Insecure service configuration - Header Checking
- 420 – Password reset poisoning
- 421 – Insecure encryption algorithm - Insecure Elliptic Curve
- 428 – Inappropriate coding practices - invalid file
- 435 – Use of software with known vulnerabilities in environments
- 021 – XPath injection
- 003 – Symmetric denial of service
- 004 – Remote command execution
- 006 – Authentication mechanism absence or evasion
- 007 – Cross-site request forgery
- 009 – Sensitive information in source code
- 011 – Use of software with known vulnerabilities
- 013 – Insecure object reference
- 014 – Insecure functionality
- 017 – Sensitive information sent insecurely
- 020 – Non-encrypted confidential information
- 022 – Use of an insecure channel
- 028 – Insecure temporary files
- 033 – Password change without identity check
- 034 – Insecure generation of random numbers
- 036 – ViewState not encrypted
- 039 – Improper authorization control for web services
- 042 – Insecurely generated cookies
- 043 – Insecure or unset HTTP headers - Content-Security-Policy
- 052 – Insecure encryption algorithm
- 053 – Lack of protection against brute force attacks
- 059 – Sensitive information stored in logs
- 060 – Insecure service configuration - Host verification
- 066 – Technical information leak - Console functions
- 067 – Improper resource allocation
- 068 – Insecure session expiration time
- 071 – Insecure or unset HTTP headers - Referrer-Policy
- 076 – Insecure session management
- 078 – Insecurely generated token
- 079 – Non-upgradable dependencies
- 088 – Privacy violation
- 089 – Lack of data validation - Trust boundary violation
- 091 – Log injection
- 092 – Insecure encryption algorithm - Anonymous cipher suites
- 094 – Insecure encryption algorithm - Cipher Block Chaining
- 095 – Data uniqueness not properly verified
- 096 – Insecure deserialization
- 098 – External control of file name or path