logo

Database

Ruby fixes

002 Asymmetric denial of service003 Symmetric denial of service004 Remote command execution005 Privilege escalation007 Cross-site request forgery008 Reflected cross-site scripting (XSS)009 Sensitive information in source code010 Stored cross-site scripting (XSS)011 Use of software with known vulnerabilities013 Insecure object reference014 Insecure functionality015 Insecure authentication method - Basic016 Insecure encryption algorithm - SSL/TLS017 Sensitive information sent insecurely019 Administrative credentials stored in cache memory021 XPath injection023 Uncontrolled external site redirect - Host Header Injection026 User enumeration027 Insecure file upload028 Insecure temporary files029 Inadequate file size control033 Password change without identity check034 Insecure generation of random numbers037 Technical information leak041 Enabled default credentials042 Insecurely generated cookies043 Insecure or unset HTTP headers - Content-Security-Policy044 Insecure HTTP methods enabled045 HTML code injection047 Automatic information enumeration050 Guessed weak credentials051 Cracked weak credentials052 Insecure encryption algorithm053 Lack of protection against brute force attacks056 Anonymous connection057 Asymmetric denial of service - Content length059 Sensitive information stored in logs061 Remote File Inclusion062 Concurrent sessions063 Lack of data validation - Path Traversal065 Cached form fields066 Technical information leak - Console functions067 Improper resource allocation068 Insecure session expiration time071 Insecure or unset HTTP headers - Referrer-Policy076 Insecure session management078 Insecurely generated token081 Lack of multi-factor authentication082 Insecurely deleted files083 XML injection (XXE)085 Sensitive data stored in client-side storage086 Missing subresource integrity check087 Account lockout090 CSV injection091 Log injection092 Insecure encryption algorithm - Anonymous cipher suites093 Hidden fields manipulation094 Insecure encryption algorithm - Cipher Block Chaining095 Data uniqueness not properly verified096 Insecure deserialization098 External control of file name or path100 Server-side request forgery (SSRF)102 Email uniqueness not properly verified105 Apache lucene query injection106 NoSQL injection107 LDAP injection108 Improper control of interaction frequency113 Improper type assignation115 Security controls bypass or absence116 XS-Leaks119 Metadata with sensitive information120 Improper dependency pinning121 HTTP parameter pollution123 Local file inclusion124 Race condition125 Directory listing127 Lack of data validation - Type confusion128 Insecurely generated cookies - HttpOnly129 Insecurely generated cookies - SameSite130 Insecurely generated cookies - Secure131 Insecure or unset HTTP headers - Strict Transport Security132 Insecure or unset HTTP headers - X-Content-Type-Options133 Insecure encryption algorithm - Perfect Forward Secrecy134 Insecure or unset HTTP headers - CORS135 Insecure or unset HTTP headers - X-XSS Protection136 Insecure or unset HTTP headers - Cache Control137 Insecure or unset HTTP headers - X-Permitted-Cross-Domain-Policies138 Inappropriate coding practices140 Insecure exceptions - Empty or no catch141 Lack of data validation - URL142 Sensitive information in source code - API Key145 Inappropriate coding practices - Cyclomatic complexity146 SQL injection147 Insecure encryption algorithm - SSLContext148 Use of an insecure channel - FTP149 Use of an insecure channel - SMTP151 Use of an insecure channel - Telnet152 Insecure or unset HTTP headers - X-Frame Options153 Insecure or unset HTTP headers - Accept154 Time-based SQL Injection155 SQL Injection - Headers156 Uncontrolled external site redirect159 Excessive privileges160 Excessive privileges - Temporary Files183 Debugging enabled in production184 Lack of data validation185 Lack of data validation - Header x-amzn-RequestId186 Lack of data validation - Web Service187 Lack of data validation - Source Code188 Lack of data validation - Modify DOM Elements190 Lack of data validation - Session Cookie191 Lack of data validation - Responses192 Lack of data validation - Reflected Parameters193 Lack of data validation - Host Header Injection194 Lack of data validation - Input Length195 Lack of data validation - Headers196 Lack of data validation - Dates197 Lack of data validation - Numbers198 Lack of data validation - Out of range199 Lack of data validation - Emails200 Traceability loss201 Unauthorized access to files204 Insufficient data authenticity validation211 Asymmetric denial of service - ReDoS233 Incomplete functional code234 Technical information leak - Stacktrace235 Technical information leak - Headers236 Technical information leak - SourceMap237 Technical information leak - Print Functions238 Technical information leak - API239 Technical information leak - Errors252 Automatic information enumeration - Open ports254 Automatic information enumeration - Credit Cards255 Insecure functionality - Pass the hash261 Insecure encryption algorithm - DSA262 Insecure encryption algorithm - SHA1263 Insecure encryption algorithm - MD5264 Insecure encryption algorithm - TripleDES265 Insecure encryption algorithm - AES269 Insecure encryption algorithm - Blowfish270 Insecure functionality - File Creation271 Insecure functionality - Password management272 Insecure functionality - Masking273 Insecure functionality - Fingerprint274 Restricted fields manipulation276 Sensitive information sent via URL parameters - Session277 Weak credential policy - Password Expiration278 Insecure exceptions - NullPointerException280 Session Fixation283 Automatic information enumeration - Personal Information286 Insecure object reference - Personal information287 Insecure object reference - Corporate information288 Insecure object reference - Financial information289 Technical information leak - Logs290 Technical information leak - IPs295 Insecure session management - Change Password296 Weak credential policy - Password Change Limit297 SQL injection - Code301 Concurrent sessions control bypass302 Insecure functionality - Session management305 Security controls bypass or absence - Data creation306 Insecure object reference - Files307 Insecure object reference - Data308 Enabled default configuration309 Insecurely generated token - JWT310 Unauthorized access to screen317 Improper resource allocation - Memory leak318 Insecurely generated token - Validation321 Lack of data validation - HTML code322 Insecurely generated token - Lifespan324 Insecure functionality - User management326 Sensitive information in source code - Dependencies328 Insecure object reference - Session management329 Insecure or unset HTTP headers - Content-Type330 Lack of protection against brute force attacks - Credentials337 Insecure session management - CSRF Fixation340 Lack of data validation - Special Characters341 Lack of data validation - OTP344 Lack of data validation - Non Sanitized Variables345 Security controls bypass or absence - Session Invalidation349 Technical information leak - Credentials351 Automatic information enumeration - Corporate information353 Lack of data validation - Token354 Insecure file upload - Files Limit355 Insufficient data authenticity validation - Checksum verification359 Sensitive information in source code - Credentials362 Technical information leak - Content response363 Weak credential policy - Password strength364 Weak credential policy - Temporary passwords369 Insecure object reference - User deletion371 DOM-Based cross-site scripting (XSS)372 Use of an insecure channel - HTTP375 Security controls bypass or absence - Tampering Protection376 Security controls bypass or absence - Reversing Protection382 Insufficient data authenticity validation - Front bypass383 Insecurely generated token - OTP388 Insecure authentication method - NTLM391 Inappropriate coding practices - Unused properties393 Use of software with known vulnerabilities in development395 Insecure generation of random numbers - Static IV397 Insecure authentication method - LDAP404 OS Command Injection411 Insecure encryption algorithm - Default encryption420 Password reset poisoning421 Insecure encryption algorithm - Insecure Elliptic Curve422 Server side template injection423 Inappropriate coding practices - System exit428 Inappropriate coding practices - invalid file429 Universal cross-site scripting (UXSS)432 Inappropriate coding practices - relative path command434 Client-side template injection435 Use of software with known vulnerabilities in environments436 Security controls bypass or absence - Fingerprint