Explore

Filters (0) Clear filters
Languages
Level
Tags

26-50 of 219

Crypto: KeyPair Generation: Non Standard Cryptographic Algorithm

This cryptographic algorithm is not recommended

  • error
  • java
  • security
  • basic protection set
Crypto: Signature: Approved Hashing Algorithm

This hashing algorithm is not recommended for cryptographic use

  • marked_information
  • java
  • security
  • basic protection set
Crypto: Signature: Insecure Hashing Algorithm

This hashing algorithm is not recommended for cryptographic use

  • error
  • java
  • security
  • basic protection set
Crypto: Signature: Non Standard Hashing Algorithm

This hashing algorithm is not recommended for cryptographic use

  • warning
  • java
  • security
  • basic protection set
CSRF: Disabled CSRF protection (AbstractHttpConfigurer)

Disabling Spring Security's CSRF protection makes the application vulnerable

  • error
  • java
  • Spring
  • security
  • framework specific
  • web
  • Spring Security
  • CSRF
  • OWASP Top 10
CSRF: Disabled CSRF protection (HttpSecurity)

Disabling Spring Security's CSRF protection makes the application vulnerable

  • error
  • java
  • Spring
  • security
  • framework specific
  • web
  • Spring Security
  • CSRF
  • OWASP Top 10
Data: Injection: Parameterize LDAP Filters: DirContext#search

Could lead to LDAP Injection

  • error
  • java
  • security
  • LDAP
  • injection
  • OWASP Top 10
Data Protection: Avoid Data Exposure - Avoid Device Protected Storage - Compliant

Compliant

  • compliant
  • java
  • security
  • framework specific
  • mobile
  • Android
  • Android security set
Data Protection - Cryptography: Avoid brute forcing: Use sufficiently long key sizes: keyGenerator

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use appropriate secret key generation algorithm: DES family

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use appropriate secret key generation algorithm: Hmac family

Could lead to brute forcing or other cryptographic weakness

  • warning
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use appropriate secret key generation algorithm: Other algorithms

Could lead to brute forcing or other cryptographic weakness

  • marked_information
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use strong symmetric cryptographic algorithm (Untrusted)

Alowing untrusted input to determine the encryption algorithm could lead to cryptographic weakness.

  • warning
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use sufficiently long key sizes: keyGenerator bad value

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use sufficiently long key sizes: keyPairGenerator

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use sufficiently long key sizes: keyPairGenerator bad value

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Data Protection - Secure Data Display: Avoid Data Exposure: set FLAG_SECURE

Could leak sensitive information

  • error
  • java
  • security
  • mobile
  • framework specific
  • Android
  • Android security set
Data Protection - Secure Data Display: Avoid Data Exposure: Use FlagSecureHelper to create toasts

Could lead to Data Exposure

  • error
  • java
  • security
  • framework specific
  • mobile
  • Android
  • Android security set
Data Protection - Secure Data Display: Avoid Data Exposure: Use FlagSecureHelper to create toasts Compliant

Could lead to Data Exposure - Compliant

  • compliant
  • java
  • security
  • framework specific
  • mobile
  • Android
  • Android security set