Typescript fixes
002 – Asymmetric denial of service003 – Symmetric denial of service004 – Remote command execution005 – Privilege escalation006 – Authentication mechanism absence or evasion007 – Cross-site request forgery008 – Reflected cross-site scripting (XSS)009 – Sensitive information in source code010 – Stored cross-site scripting (XSS)013 – Insecure object reference015 – Insecure authentication method - Basic017 – Sensitive information sent insecurely019 – Administrative credentials stored in cache memory021 – XPath injection022 – Use of an insecure channel023 – Uncontrolled external site redirect - Host Header Injection026 – User enumeration027 – Insecure file upload028 – Insecure temporary files029 – Inadequate file size control030 – Sensitive information sent via URL parameters033 – Password change without identity check034 – Insecure generation of random numbers037 – Technical information leak038 – Business information leak039 – Improper authorization control for web services041 – Enabled default credentials042 – Insecurely generated cookies043 – Insecure or unset HTTP headers - Content-Security-Policy044 – Insecure HTTP methods enabled047 – Automatic information enumeration050 – Guessed weak credentials051 – Cracked weak credentials052 – Insecure encryption algorithm053 – Lack of protection against brute force attacks057 – Asymmetric denial of service - Content length059 – Sensitive information stored in logs061 – Remote File Inclusion062 – Concurrent sessions063 – Lack of data validation - Path Traversal064 – Traceability loss - Server's clock066 – Technical information leak - Console functions067 – Improper resource allocation068 – Insecure session expiration time069 – Weak CAPTCHA071 – Insecure or unset HTTP headers - Referrer-Policy076 – Insecure session management078 – Insecurely generated token079 – Non-upgradable dependencies080 – Business information leak - Customers or providers083 – XML injection (XXE)089 – Lack of data validation - Trust boundary violation090 – CSV injection091 – Log injection092 – Insecure encryption algorithm - Anonymous cipher suites093 – Hidden fields manipulation094 – Insecure encryption algorithm - Cipher Block Chaining095 – Data uniqueness not properly verified096 – Insecure deserialization098 – External control of file name or path100 – Server-side request forgery (SSRF)102 – Email uniqueness not properly verified106 – NoSQL injection107 – LDAP injection108 – Improper control of interaction frequency111 – Out-of-bounds read113 – Improper type assignation115 – Security controls bypass or absence119 – Metadata with sensitive information120 – Improper dependency pinning121 – HTTP parameter pollution123 – Local file inclusion124 – Race condition125 – Directory listing127 – Lack of data validation - Type confusion128 – Insecurely generated cookies - HttpOnly129 – Insecurely generated cookies - SameSite130 – Insecurely generated cookies - Secure131 – Insecure or unset HTTP headers - Strict Transport Security133 – Insecure encryption algorithm - Perfect Forward Secrecy134 – Insecure or unset HTTP headers - CORS135 – Insecure or unset HTTP headers - X-XSS Protection136 – Insecure or unset HTTP headers - Cache Control137 – Insecure or unset HTTP headers - X-Permitted-Cross-Domain-Policies138 – Inappropriate coding practices140 – Insecure exceptions - Empty or no catch141 – Lack of data validation - URL142 – Sensitive information in source code - API Key143 – Inappropriate coding practices - Eval function145 – Inappropriate coding practices - Cyclomatic complexity146 – SQL injection147 – Insecure encryption algorithm - SSLContext148 – Use of an insecure channel - FTP149 – Use of an insecure channel - SMTP152 – Insecure or unset HTTP headers - X-Frame Options153 – Insecure or unset HTTP headers - Accept154 – Time-based SQL Injection155 – SQL Injection - Headers156 – Uncontrolled external site redirect159 – Excessive privileges160 – Excessive privileges - Temporary Files184 – Lack of data validation185 – Lack of data validation - Header x-amzn-RequestId187 – Lack of data validation - Source Code189 – Lack of data validation - Content Spoofing190 – Lack of data validation - Session Cookie191 – Lack of data validation - Responses192 – Lack of data validation - Reflected Parameters193 – Lack of data validation - Host Header Injection194 – Lack of data validation - Input Length195 – Lack of data validation - Headers196 – Lack of data validation - Dates197 – Lack of data validation - Numbers199 – Lack of data validation - Emails200 – Traceability loss201 – Unauthorized access to files204 – Insufficient data authenticity validation211 – Asymmetric denial of service - ReDoS213 – Business information leak - JWT214 – Business information leak - Credentials216 – Business information leak - Source Code217 – Business information leak - Credit Cards220 – Business information leak - Token221 – Business information leak - Users226 – Business information leak - Personal Information228 – Business information leak - Analytics233 – Incomplete functional code235 – Technical information leak - Headers236 – Technical information leak - SourceMap237 – Technical information leak - Print Functions238 – Technical information leak - API239 – Technical information leak - Errors240 – Authentication mechanism absence or evasion - OTP245 – Non-encrypted confidential information - Credit Cards246 – Non-encrypted confidential information - DB248 – Non-encrypted confidential information - LDAP249 – Non-encrypted confidential information - Credentials254 – Automatic information enumeration - Credit Cards261 – Insecure encryption algorithm - DSA262 – Insecure encryption algorithm - SHA1263 – Insecure encryption algorithm - MD5264 – Insecure encryption algorithm - TripleDES265 – Insecure encryption algorithm - AES269 – Insecure encryption algorithm - Blowfish270 – Insecure functionality - File Creation271 – Insecure functionality - Password management272 – Insecure functionality - Masking273 – Insecure functionality - Fingerprint274 – Restricted fields manipulation276 – Sensitive information sent via URL parameters - Session280 – Session Fixation282 – Insecure encryption algorithm - ECB283 – Automatic information enumeration - Personal Information284 – Non-encrypted confidential information - Base 64286 – Insecure object reference - Personal information287 – Insecure object reference - Corporate information288 – Insecure object reference - Financial information289 – Technical information leak - Logs291 – Business information leak - Financial Information295 – Insecure session management - Change Password296 – Weak credential policy - Password Change Limit297 – SQL injection - Code298 – Authentication mechanism absence or evasion - Redirect301 – Concurrent sessions control bypass302 – Insecure functionality - Session management305 – Security controls bypass or absence - Data creation306 – Insecure object reference - Files307 – Insecure object reference - Data308 – Enabled default configuration309 – Insecurely generated token - JWT317 – Improper resource allocation - Memory leak318 – Insecurely generated token - Validation321 – Lack of data validation - HTML code322 – Insecurely generated token - Lifespan324 – Insecure functionality - User management328 – Insecure object reference - Session management329 – Insecure or unset HTTP headers - Content-Type330 – Lack of protection against brute force attacks - Credentials332 – Use of insecure channel - Source code336 – Business information leak - Corporate information337 – Insecure session management - CSRF Fixation340 – Lack of data validation - Special Characters341 – Lack of data validation - OTP344 – Lack of data validation - Non Sanitized Variables345 – Security controls bypass or absence - Session Invalidation349 – Technical information leak - Credentials353 – Lack of data validation - Token354 – Insecure file upload - Files Limit355 – Insufficient data authenticity validation - Checksum verification359 – Sensitive information in source code - Credentials362 – Technical information leak - Content response363 – Weak credential policy - Password strength364 – Weak credential policy - Temporary passwords365 – Authentication mechanism absence or evasion - Response tampering369 – Insecure object reference - User deletion371 – DOM-Based cross-site scripting (XSS)372 – Use of an insecure channel - HTTP378 – Non-encrypted confidential information - Hexadecimal383 – Insecurely generated token - OTP384 – Inappropriate coding practices - Wildcard export388 – Insecure authentication method - NTLM391 – Inappropriate coding practices - Unused properties395 – Insecure generation of random numbers - Static IV404 – OS Command Injection405 – Excessive privileges - Access Mode417 – Account Takeover420 – Password reset poisoning421 – Insecure encryption algorithm - Insecure Elliptic Curve422 – Server side template injection425 – Server side cross-site scripting432 – Inappropriate coding practices - relative path command435 – Use of software with known vulnerabilities in environments