Explore
426-450 of 589
SQL Injection: SQLiteDatabase#execSQL
This query could lead to SQL injection
- error
- java
- security
- framework specific
- mobile
- injection
- Android
- SQL
- OWASP Top 10
SQL Injection: SQLiteDatabase#query - 1st parameter
This query could lead to SQL injection
- error
- java
- security
- framework specific
- mobile
- injection
- Android
- SQL
- OWASP Top 10
SQL Injection: SQLiteDatabase#query - 2nd parameter
This query could lead to SQL injection
- error
- java
- security
- framework specific
- mobile
- injection
- Android
- SQL
- OWASP Top 10
SQL Injection: SQLiteDatabase#query - 3rd parameter
This query could lead to SQL injection
- error
- java
- security
- framework specific
- mobile
- injection
- Android
- SQL
- OWASP Top 10
SQL Injection: SQLiteDatabase#query - 5th parameter
This query could lead to SQL injection
- error
- java
- security
- framework specific
- mobile
- injection
- Android
- SQL
- OWASP Top 10
SQL Injection: SQLiteQueryBuilder appendWhere
This query could lead to SQL injection
- error
- java
- security
- framework specific
- mobile
- injection
- Android
- SQL
- OWASP Top 10
SQL Injection: SQLiteQueryBuilder#buildQuery
This method is vulnerable to SQL injection. Consider writing the query instead of relying on builders.
- error
- java
- security
- framework specific
- mobile
- injection
- SQL
- Android
- OWASP Top 10
SQL Injection: SQLiteQueryBuilder compileStatement
This query could lead to SQL injection
- error
- java
- security
- framework specific
- mobile
- injection
- Android
- SQL
- OWASP Top 10
SQL Injection: SQLiteQueryBuilder compileStatement Compliant
SQL Injection: SQLiteQueryBuilder compileStatement - Compliant
- compliant
- java
- security
- framework specific
- mobile
- injection
- Android
- SQL
- Android security set
- OWASP Top 10
Storage best practices: deprecated operating mode
This operating mode has been deprecated
- warning
- java
- security
- framework specific
- mobile
- Android
Storage best practices: insecure operating mode
When using this value other applications will have access to your application's data
- error
- java
- security
- framework specific
- mobile
- Android
- Android security set
String.format return value being ignored
A call to String.format is being made without the return value being used
- warning
- java
- Java basic
- quality
Strings: Regex Use: Escape Regex Special Character for Any Char Matching
First argument is a regular expression, matching with dot might have unintended behaviour.
- error
- java
- security
- Java basic
Suffix Matching: UseRegisteredSuffixPatternMatch set to false to prevent suffix pattern matching
Prevent suffix pattern matching by setting UseRegisteredSuffixPatternMatch to false
- warning
- java
- Spring
- security
- framework specific
- web
- Spring Web
Suffix Matching: UseSuffixPatternMatch set to false to prevent suffix pattern matching
Prevent suffix pattern matching by setting UseSuffixPatternMatching to false
- warning
- java
- Spring
- security
- framework specific
- web
- Spring Web
System.err consistent Java Logger logging
Replace System.err.print.* with consistent Java Logger error logging
- marked_information
- java
- framework specific
- logging
- Logger
- quality
System.out consistent Java Logger logging
Replace System.out.print.* with consistent Java Logger error logging
- marked_information
- java
- framework specific
- logging
- Logger
- quality
Test framework: Enforce @Rule annotation for a JUnitSoftAssertions field
A JUnitSoftAssertions field always need to have the @Rule annotation
- error
- java
- testing
- framework specific
- JUnit 4
- quality
TLS: Disabled Certificate validation
The verify method has been overridden, and always returns true
- warning
- java
- security
- web
- TLS
- OWASP Top 10
TLS: Weak Encryption: Insecure Version
Could lead to Data Exposure
- error
- java
- security
- web
- TLS
- OWASP Top 10
TLS: Weak Encryption: Outdated Version
Could lead to Data Exposure
- warning
- java
- security
- web
- TLS
- OWASP Top 10
Untrusted input in logging
Prevent log injection by filtering untrusted input
- info
- java
- security
- OWASP Top 10
- framework specific
- logging
- Logger
- injection
URLClassloader: Call super when overriding getPermissions
Custom permissions should be based on those of the super class using super.getPermissions
- warning
- java
- security
- Java basic
- SEI CERT