logo

Database

Python fixes

002 Asymmetric denial of service003 Symmetric denial of service004 Remote command execution005 Privilege escalation006 Authentication mechanism absence or evasion007 Cross-site request forgery008 Reflected cross-site scripting (XSS)013 Insecure object reference014 Insecure functionality015 Insecure authentication method - Basic016 Insecure encryption algorithm - SSL/TLS017 Sensitive information sent insecurely020 Non-encrypted confidential information021 XPath injection022 Use of an insecure channel023 Uncontrolled external site redirect - Host Header Injection026 User enumeration027 Insecure file upload028 Insecure temporary files029 Inadequate file size control030 Sensitive information sent via URL parameters033 Password change without identity check034 Insecure generation of random numbers039 Improper authorization control for web services041 Enabled default credentials042 Insecurely generated cookies043 Insecure or unset HTTP headers - Content-Security-Policy047 Automatic information enumeration050 Guessed weak credentials051 Cracked weak credentials052 Insecure encryption algorithm053 Lack of protection against brute force attacks057 Asymmetric denial of service - Content length059 Sensitive information stored in logs060 Insecure service configuration - Host verification061 Remote File Inclusion062 Concurrent sessions063 Lack of data validation - Path Traversal064 Traceability loss - Server's clock067 Improper resource allocation068 Insecure session expiration time071 Insecure or unset HTTP headers - Referrer-Policy076 Insecure session management078 Insecurely generated token079 Non-upgradable dependencies080 Business information leak - Customers or providers082 Insecurely deleted files083 XML injection (XXE)089 Lack of data validation - Trust boundary violation090 CSV injection091 Log injection092 Insecure encryption algorithm - Anonymous cipher suites093 Hidden fields manipulation094 Insecure encryption algorithm - Cipher Block Chaining095 Data uniqueness not properly verified096 Insecure deserialization098 External control of file name or path100 Server-side request forgery (SSRF)102 Email uniqueness not properly verified106 NoSQL injection107 LDAP injection108 Improper control of interaction frequency113 Improper type assignation116 XS-Leaks118 Regulation infringement119 Metadata with sensitive information120 Improper dependency pinning121 HTTP parameter pollution123 Local file inclusion124 Race condition125 Directory listing127 Lack of data validation - Type confusion128 Insecurely generated cookies - HttpOnly129 Insecurely generated cookies - SameSite130 Insecurely generated cookies - Secure131 Insecure or unset HTTP headers - Strict Transport Security132 Insecure or unset HTTP headers - X-Content-Type-Options134 Insecure or unset HTTP headers - CORS135 Insecure or unset HTTP headers - X-XSS Protection136 Insecure or unset HTTP headers - Cache Control138 Inappropriate coding practices140 Insecure exceptions - Empty or no catch142 Sensitive information in source code - API Key143 Inappropriate coding practices - Eval function145 Inappropriate coding practices - Cyclomatic complexity147 Insecure encryption algorithm - SSLContext148 Use of an insecure channel - FTP150 Use of an insecure channel - useSslProtocol()151 Use of an insecure channel - Telnet152 Insecure or unset HTTP headers - X-Frame Options153 Insecure or unset HTTP headers - Accept154 Time-based SQL Injection155 SQL Injection - Headers156 Uncontrolled external site redirect179 Insecure service configuration - SMB180 Insecure service configuration - SMTP183 Debugging enabled in production184 Lack of data validation185 Lack of data validation - Header x-amzn-RequestId186 Lack of data validation - Web Service187 Lack of data validation - Source Code190 Lack of data validation - Session Cookie191 Lack of data validation - Responses192 Lack of data validation - Reflected Parameters193 Lack of data validation - Host Header Injection194 Lack of data validation - Input Length195 Lack of data validation - Headers196 Lack of data validation - Dates197 Lack of data validation - Numbers198 Lack of data validation - Out of range199 Lack of data validation - Emails200 Traceability loss201 Unauthorized access to files204 Insufficient data authenticity validation210 Security controls bypass or absence - Facial Recognition211 Asymmetric denial of service - ReDoS213 Business information leak - JWT214 Business information leak - Credentials216 Business information leak - Source Code217 Business information leak - Credit Cards218 Business information leak - Network Unit220 Business information leak - Token221 Business information leak - Users223 Business information leak - JFROG226 Business information leak - Personal Information235 Technical information leak - Headers237 Technical information leak - Print Functions239 Technical information leak - Errors240 Authentication mechanism absence or evasion - OTP243 Authentication mechanism absence or evasion - Admin Console245 Non-encrypted confidential information - Credit Cards246 Non-encrypted confidential information - DB247 Non-encrypted confidential information - AWS248 Non-encrypted confidential information - LDAP249 Non-encrypted confidential information - Credentials254 Automatic information enumeration - Credit Cards261 Insecure encryption algorithm - DSA262 Insecure encryption algorithm - SHA1263 Insecure encryption algorithm - MD5264 Insecure encryption algorithm - TripleDES265 Insecure encryption algorithm - AES269 Insecure encryption algorithm - Blowfish270 Insecure functionality - File Creation271 Insecure functionality - Password management272 Insecure functionality - Masking273 Insecure functionality - Fingerprint274 Restricted fields manipulation275 Non-encrypted confidential information - Local data276 Sensitive information sent via URL parameters - Session280 Session Fixation282 Insecure encryption algorithm - ECB283 Automatic information enumeration - Personal Information284 Non-encrypted confidential information - Base 64286 Insecure object reference - Personal information289 Technical information leak - Logs294 Insecure service configuration - OTP295 Insecure session management - Change Password296 Weak credential policy - Password Change Limit297 SQL injection - Code298 Authentication mechanism absence or evasion - Redirect302 Insecure functionality - Session management305 Security controls bypass or absence - Data creation306 Insecure object reference - Files307 Insecure object reference - Data309 Insecurely generated token - JWT310 Unauthorized access to screen317 Improper resource allocation - Memory leak318 Insecurely generated token - Validation319 Insecure service configuration - Roles321 Lack of data validation - HTML code322 Insecurely generated token - Lifespan326 Sensitive information in source code - Dependencies328 Insecure object reference - Session management329 Insecure or unset HTTP headers - Content-Type330 Lack of protection against brute force attacks - Credentials332 Use of insecure channel - Source code336 Business information leak - Corporate information337 Insecure session management - CSRF Fixation338 Insecure service configuration - Salt340 Lack of data validation - Special Characters341 Lack of data validation - OTP343 Insecure service configuration - BREACH Attack344 Lack of data validation - Non Sanitized Variables345 Security controls bypass or absence - Session Invalidation353 Lack of data validation - Token354 Insecure file upload - Files Limit355 Insufficient data authenticity validation - Checksum verification359 Sensitive information in source code - Credentials363 Weak credential policy - Password strength364 Weak credential policy - Temporary passwords365 Authentication mechanism absence or evasion - Response tampering367 Sensitive information in source code - Git history369 Insecure object reference - User deletion372 Use of an insecure channel - HTTP378 Non-encrypted confidential information - Hexadecimal383 Insecurely generated token - OTP384 Inappropriate coding practices - Wildcard export385 Non-encrypted confidential information - Keys388 Insecure authentication method - NTLM391 Inappropriate coding practices - Unused properties393 Use of software with known vulnerabilities in development395 Insecure generation of random numbers - Static IV404 OS Command Injection410 Dependency Confusion420 Password reset poisoning421 Insecure encryption algorithm - Insecure Elliptic Curve422 Server side template injection425 Server side cross-site scripting428 Inappropriate coding practices - invalid file435 Use of software with known vulnerabilities in environments436 Security controls bypass or absence - Fingerprint