Explore

Filters (0) Clear filters
Languages
Level
Tags

1-25 of 44

Crypto: Cipher: Insecure Asymmetric Cryptographic Algorithm

This cryptographic algorithm is not recommended

  • error
  • java
  • security
  • basic protection set
Crypto: KeyAgreement: Guide on Approved Cryptographic Algorithm

This cryptographic algorithm is not recommended

  • marked_information
  • java
  • security
  • basic protection set
Crypto: KeyAgreement: Insecure Cryptographic Algorithm

This cryptographic algorithm is insecure

  • error
  • java
  • security
  • basic protection set
Crypto: KeyPair Generation: Approved Standard Cryptographic Algorithm

This cryptographic algorithm is not recommended

  • error
  • java
  • security
  • basic protection set
Crypto: KeyPair Generation: Insecure Cryptographic Algorithm

This cryptographic algorithm is insecure

  • error
  • java
  • security
  • basic protection set
Crypto: KeyPair Generation: Non Standard Cryptographic Algorithm

This cryptographic algorithm is not recommended

  • error
  • java
  • security
  • basic protection set
Crypto: Signature: Approved Hashing Algorithm

This hashing algorithm is not recommended for cryptographic use

  • marked_information
  • java
  • security
  • basic protection set
Crypto: Signature: Insecure Hashing Algorithm

This hashing algorithm is not recommended for cryptographic use

  • error
  • java
  • security
  • basic protection set
Crypto: Signature: Non Standard Hashing Algorithm

This hashing algorithm is not recommended for cryptographic use

  • warning
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid brute forcing: Use sufficiently long key sizes: keyGenerator

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use appropriate secret key generation algorithm: DES family

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use appropriate secret key generation algorithm: Hmac family

Could lead to brute forcing or other cryptographic weakness

  • warning
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use appropriate secret key generation algorithm: Other algorithms

Could lead to brute forcing or other cryptographic weakness

  • marked_information
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use strong symmetric cryptographic algorithm (Untrusted)

Alowing untrusted input to determine the encryption algorithm could lead to cryptographic weakness.

  • warning
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use sufficiently long key sizes: keyGenerator bad value

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use sufficiently long key sizes: keyPairGenerator

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Data Protection - Cryptography: Avoid cryptographic weakness: Use sufficiently long key sizes: keyPairGenerator bad value

Could lead to brute forcing or other cryptographic weakness

  • error
  • java
  • security
  • basic protection set
Injection: Avoid Code Injection: Use SafeConstructor: 1st argument of type Constructor

Could lead to Remote Code Execution

  • error
  • java
  • security
  • basic protection set
  • injection
  • YAML
  • OWASP Top 10
Injection: Avoid Code Injection: Use SafeConstructor: arguments, but no Constructor argument

Could lead to Remote Code Execution

  • error
  • java
  • security
  • basic protection set
  • injection
  • YAML
  • OWASP Top 10