logo

Database

Typescript fixes

002 Asymmetric denial of service003 Symmetric denial of service004 Remote command execution005 Privilege escalation006 Authentication mechanism absence or evasion007 Cross-site request forgery008 Reflected cross-site scripting (XSS)009 Sensitive information in source code010 Stored cross-site scripting (XSS)013 Insecure object reference015 Insecure authentication method - Basic017 Sensitive information sent insecurely019 Administrative credentials stored in cache memory021 XPath injection022 Use of an insecure channel023 Uncontrolled external site redirect - Host Header Injection026 User enumeration027 Insecure file upload028 Insecure temporary files029 Inadequate file size control030 Sensitive information sent via URL parameters033 Password change without identity check034 Insecure generation of random numbers037 Technical information leak038 Business information leak039 Improper authorization control for web services041 Enabled default credentials042 Insecurely generated cookies043 Insecure or unset HTTP headers - Content-Security-Policy044 Insecure HTTP methods enabled047 Automatic information enumeration050 Guessed weak credentials051 Cracked weak credentials052 Insecure encryption algorithm053 Lack of protection against brute force attacks057 Asymmetric denial of service - Content length059 Sensitive information stored in logs061 Remote File Inclusion062 Concurrent sessions063 Lack of data validation - Path Traversal064 Traceability loss - Server's clock066 Technical information leak - Console functions067 Improper resource allocation068 Insecure session expiration time069 Weak CAPTCHA071 Insecure or unset HTTP headers - Referrer-Policy076 Insecure session management078 Insecurely generated token079 Non-upgradable dependencies080 Business information leak - Customers or providers083 XML injection (XXE)089 Lack of data validation - Trust boundary violation090 CSV injection091 Log injection092 Insecure encryption algorithm - Anonymous cipher suites093 Hidden fields manipulation094 Insecure encryption algorithm - Cipher Block Chaining095 Data uniqueness not properly verified096 Insecure deserialization098 External control of file name or path100 Server-side request forgery (SSRF)102 Email uniqueness not properly verified106 NoSQL injection107 LDAP injection108 Improper control of interaction frequency111 Out-of-bounds read113 Improper type assignation115 Security controls bypass or absence119 Metadata with sensitive information120 Improper dependency pinning121 HTTP parameter pollution123 Local file inclusion124 Race condition125 Directory listing127 Lack of data validation - Type confusion128 Insecurely generated cookies - HttpOnly129 Insecurely generated cookies - SameSite130 Insecurely generated cookies - Secure131 Insecure or unset HTTP headers - Strict Transport Security133 Insecure encryption algorithm - Perfect Forward Secrecy134 Insecure or unset HTTP headers - CORS135 Insecure or unset HTTP headers - X-XSS Protection136 Insecure or unset HTTP headers - Cache Control137 Insecure or unset HTTP headers - X-Permitted-Cross-Domain-Policies138 Inappropriate coding practices140 Insecure exceptions - Empty or no catch141 Lack of data validation - URL142 Sensitive information in source code - API Key143 Inappropriate coding practices - Eval function145 Inappropriate coding practices - Cyclomatic complexity146 SQL injection147 Insecure encryption algorithm - SSLContext148 Use of an insecure channel - FTP149 Use of an insecure channel - SMTP152 Insecure or unset HTTP headers - X-Frame Options153 Insecure or unset HTTP headers - Accept154 Time-based SQL Injection155 SQL Injection - Headers156 Uncontrolled external site redirect159 Excessive privileges160 Excessive privileges - Temporary Files184 Lack of data validation185 Lack of data validation - Header x-amzn-RequestId187 Lack of data validation - Source Code189 Lack of data validation - Content Spoofing190 Lack of data validation - Session Cookie191 Lack of data validation - Responses192 Lack of data validation - Reflected Parameters193 Lack of data validation - Host Header Injection194 Lack of data validation - Input Length195 Lack of data validation - Headers196 Lack of data validation - Dates197 Lack of data validation - Numbers199 Lack of data validation - Emails200 Traceability loss201 Unauthorized access to files204 Insufficient data authenticity validation211 Asymmetric denial of service - ReDoS213 Business information leak - JWT214 Business information leak - Credentials216 Business information leak - Source Code217 Business information leak - Credit Cards220 Business information leak - Token221 Business information leak - Users226 Business information leak - Personal Information228 Business information leak - Analytics233 Incomplete functional code235 Technical information leak - Headers236 Technical information leak - SourceMap237 Technical information leak - Print Functions238 Technical information leak - API239 Technical information leak - Errors240 Authentication mechanism absence or evasion - OTP245 Non-encrypted confidential information - Credit Cards246 Non-encrypted confidential information - DB248 Non-encrypted confidential information - LDAP249 Non-encrypted confidential information - Credentials254 Automatic information enumeration - Credit Cards261 Insecure encryption algorithm - DSA262 Insecure encryption algorithm - SHA1263 Insecure encryption algorithm - MD5264 Insecure encryption algorithm - TripleDES265 Insecure encryption algorithm - AES269 Insecure encryption algorithm - Blowfish270 Insecure functionality - File Creation271 Insecure functionality - Password management272 Insecure functionality - Masking273 Insecure functionality - Fingerprint274 Restricted fields manipulation276 Sensitive information sent via URL parameters - Session280 Session Fixation282 Insecure encryption algorithm - ECB283 Automatic information enumeration - Personal Information284 Non-encrypted confidential information - Base 64286 Insecure object reference - Personal information287 Insecure object reference - Corporate information288 Insecure object reference - Financial information289 Technical information leak - Logs291 Business information leak - Financial Information295 Insecure session management - Change Password296 Weak credential policy - Password Change Limit297 SQL injection - Code298 Authentication mechanism absence or evasion - Redirect301 Concurrent sessions control bypass302 Insecure functionality - Session management305 Security controls bypass or absence - Data creation306 Insecure object reference - Files307 Insecure object reference - Data308 Enabled default configuration309 Insecurely generated token - JWT317 Improper resource allocation - Memory leak318 Insecurely generated token - Validation321 Lack of data validation - HTML code322 Insecurely generated token - Lifespan324 Insecure functionality - User management328 Insecure object reference - Session management329 Insecure or unset HTTP headers - Content-Type330 Lack of protection against brute force attacks - Credentials332 Use of insecure channel - Source code336 Business information leak - Corporate information337 Insecure session management - CSRF Fixation340 Lack of data validation - Special Characters341 Lack of data validation - OTP344 Lack of data validation - Non Sanitized Variables345 Security controls bypass or absence - Session Invalidation349 Technical information leak - Credentials353 Lack of data validation - Token354 Insecure file upload - Files Limit355 Insufficient data authenticity validation - Checksum verification359 Sensitive information in source code - Credentials362 Technical information leak - Content response363 Weak credential policy - Password strength364 Weak credential policy - Temporary passwords365 Authentication mechanism absence or evasion - Response tampering369 Insecure object reference - User deletion371 DOM-Based cross-site scripting (XSS)372 Use of an insecure channel - HTTP378 Non-encrypted confidential information - Hexadecimal383 Insecurely generated token - OTP384 Inappropriate coding practices - Wildcard export388 Insecure authentication method - NTLM391 Inappropriate coding practices - Unused properties395 Insecure generation of random numbers - Static IV404 OS Command Injection405 Excessive privileges - Access Mode417 Account Takeover420 Password reset poisoning421 Insecure encryption algorithm - Insecure Elliptic Curve422 Server side template injection425 Server side cross-site scripting432 Inappropriate coding practices - relative path command435 Use of software with known vulnerabilities in environments