Ruby fixes
002 – Asymmetric denial of service003 – Symmetric denial of service004 – Remote command execution005 – Privilege escalation007 – Cross-site request forgery008 – Reflected cross-site scripting (XSS)009 – Sensitive information in source code010 – Stored cross-site scripting (XSS)011 – Use of software with known vulnerabilities013 – Insecure object reference014 – Insecure functionality015 – Insecure authentication method - Basic016 – Insecure encryption algorithm - SSL/TLS017 – Sensitive information sent insecurely019 – Administrative credentials stored in cache memory021 – XPath injection023 – Uncontrolled external site redirect - Host Header Injection026 – User enumeration027 – Insecure file upload028 – Insecure temporary files029 – Inadequate file size control033 – Password change without identity check034 – Insecure generation of random numbers037 – Technical information leak041 – Enabled default credentials042 – Insecurely generated cookies043 – Insecure or unset HTTP headers - Content-Security-Policy044 – Insecure HTTP methods enabled045 – HTML code injection047 – Automatic information enumeration050 – Guessed weak credentials051 – Cracked weak credentials052 – Insecure encryption algorithm053 – Lack of protection against brute force attacks056 – Anonymous connection057 – Asymmetric denial of service - Content length059 – Sensitive information stored in logs061 – Remote File Inclusion062 – Concurrent sessions063 – Lack of data validation - Path Traversal065 – Cached form fields066 – Technical information leak - Console functions067 – Improper resource allocation068 – Insecure session expiration time071 – Insecure or unset HTTP headers - Referrer-Policy076 – Insecure session management078 – Insecurely generated token081 – Lack of multi-factor authentication082 – Insecurely deleted files083 – XML injection (XXE)085 – Sensitive data stored in client-side storage086 – Missing subresource integrity check087 – Account lockout090 – CSV injection091 – Log injection092 – Insecure encryption algorithm - Anonymous cipher suites093 – Hidden fields manipulation094 – Insecure encryption algorithm - Cipher Block Chaining095 – Data uniqueness not properly verified096 – Insecure deserialization098 – External control of file name or path100 – Server-side request forgery (SSRF)102 – Email uniqueness not properly verified105 – Apache lucene query injection106 – NoSQL injection107 – LDAP injection108 – Improper control of interaction frequency113 – Improper type assignation115 – Security controls bypass or absence116 – XS-Leaks119 – Metadata with sensitive information120 – Improper dependency pinning121 – HTTP parameter pollution123 – Local file inclusion124 – Race condition125 – Directory listing127 – Lack of data validation - Type confusion128 – Insecurely generated cookies - HttpOnly129 – Insecurely generated cookies - SameSite130 – Insecurely generated cookies - Secure131 – Insecure or unset HTTP headers - Strict Transport Security132 – Insecure or unset HTTP headers - X-Content-Type-Options133 – Insecure encryption algorithm - Perfect Forward Secrecy134 – Insecure or unset HTTP headers - CORS135 – Insecure or unset HTTP headers - X-XSS Protection136 – Insecure or unset HTTP headers - Cache Control137 – Insecure or unset HTTP headers - X-Permitted-Cross-Domain-Policies138 – Inappropriate coding practices140 – Insecure exceptions - Empty or no catch141 – Lack of data validation - URL142 – Sensitive information in source code - API Key145 – Inappropriate coding practices - Cyclomatic complexity146 – SQL injection147 – Insecure encryption algorithm - SSLContext148 – Use of an insecure channel - FTP149 – Use of an insecure channel - SMTP151 – Use of an insecure channel - Telnet152 – Insecure or unset HTTP headers - X-Frame Options153 – Insecure or unset HTTP headers - Accept154 – Time-based SQL Injection155 – SQL Injection - Headers156 – Uncontrolled external site redirect159 – Excessive privileges160 – Excessive privileges - Temporary Files183 – Debugging enabled in production184 – Lack of data validation185 – Lack of data validation - Header x-amzn-RequestId186 – Lack of data validation - Web Service187 – Lack of data validation - Source Code188 – Lack of data validation - Modify DOM Elements190 – Lack of data validation - Session Cookie191 – Lack of data validation - Responses192 – Lack of data validation - Reflected Parameters193 – Lack of data validation - Host Header Injection194 – Lack of data validation - Input Length195 – Lack of data validation - Headers196 – Lack of data validation - Dates197 – Lack of data validation - Numbers198 – Lack of data validation - Out of range199 – Lack of data validation - Emails200 – Traceability loss201 – Unauthorized access to files204 – Insufficient data authenticity validation211 – Asymmetric denial of service - ReDoS233 – Incomplete functional code234 – Technical information leak - Stacktrace235 – Technical information leak - Headers236 – Technical information leak - SourceMap237 – Technical information leak - Print Functions238 – Technical information leak - API239 – Technical information leak - Errors252 – Automatic information enumeration - Open ports254 – Automatic information enumeration - Credit Cards255 – Insecure functionality - Pass the hash261 – Insecure encryption algorithm - DSA262 – Insecure encryption algorithm - SHA1263 – Insecure encryption algorithm - MD5264 – Insecure encryption algorithm - TripleDES265 – Insecure encryption algorithm - AES269 – Insecure encryption algorithm - Blowfish270 – Insecure functionality - File Creation271 – Insecure functionality - Password management272 – Insecure functionality - Masking273 – Insecure functionality - Fingerprint274 – Restricted fields manipulation276 – Sensitive information sent via URL parameters - Session277 – Weak credential policy - Password Expiration278 – Insecure exceptions - NullPointerException280 – Session Fixation283 – Automatic information enumeration - Personal Information286 – Insecure object reference - Personal information287 – Insecure object reference - Corporate information288 – Insecure object reference - Financial information289 – Technical information leak - Logs290 – Technical information leak - IPs295 – Insecure session management - Change Password296 – Weak credential policy - Password Change Limit297 – SQL injection - Code301 – Concurrent sessions control bypass302 – Insecure functionality - Session management305 – Security controls bypass or absence - Data creation306 – Insecure object reference - Files307 – Insecure object reference - Data308 – Enabled default configuration309 – Insecurely generated token - JWT310 – Unauthorized access to screen317 – Improper resource allocation - Memory leak318 – Insecurely generated token - Validation321 – Lack of data validation - HTML code322 – Insecurely generated token - Lifespan324 – Insecure functionality - User management326 – Sensitive information in source code - Dependencies328 – Insecure object reference - Session management329 – Insecure or unset HTTP headers - Content-Type330 – Lack of protection against brute force attacks - Credentials337 – Insecure session management - CSRF Fixation340 – Lack of data validation - Special Characters341 – Lack of data validation - OTP344 – Lack of data validation - Non Sanitized Variables345 – Security controls bypass or absence - Session Invalidation349 – Technical information leak - Credentials351 – Automatic information enumeration - Corporate information353 – Lack of data validation - Token354 – Insecure file upload - Files Limit355 – Insufficient data authenticity validation - Checksum verification359 – Sensitive information in source code - Credentials362 – Technical information leak - Content response363 – Weak credential policy - Password strength364 – Weak credential policy - Temporary passwords369 – Insecure object reference - User deletion371 – DOM-Based cross-site scripting (XSS)372 – Use of an insecure channel - HTTP375 – Security controls bypass or absence - Tampering Protection376 – Security controls bypass or absence - Reversing Protection382 – Insufficient data authenticity validation - Front bypass383 – Insecurely generated token - OTP388 – Insecure authentication method - NTLM391 – Inappropriate coding practices - Unused properties393 – Use of software with known vulnerabilities in development395 – Insecure generation of random numbers - Static IV397 – Insecure authentication method - LDAP404 – OS Command Injection411 – Insecure encryption algorithm - Default encryption420 – Password reset poisoning421 – Insecure encryption algorithm - Insecure Elliptic Curve422 – Server side template injection423 – Inappropriate coding practices - System exit428 – Inappropriate coding practices - invalid file429 – Universal cross-site scripting (UXSS)432 – Inappropriate coding practices - relative path command434 – Client-side template injection435 – Use of software with known vulnerabilities in environments436 – Security controls bypass or absence - Fingerprint