java
Business information leak - Customers or providers - Java
Need Protection of sensitive business information from unauthorized access or leakage Context Usage of Java for building robust and scalable applications Usage of javax.servlet for building Java web applications Usage of java.io for input and output ...
Non-upgradable dependencies - Java
Need Explicitly declare and manage dependencies in the source code to ensure upgradability and avoid potential security vulnerabilities. Context Usage of Java for building robust and scalable applications Usage of javax.servlet for building Java web ...
Insecurely generated token - Java
Need Secure token generation mechanism Context Usage of Java 8 for developing applications with enhanced features and performance Usage of java.util.Random for generating random numbers in Java Usage of javax.servlet.http.Cookie for handling HTTP ...
Insecure session management - Java
Need Secure session management Context Usage of Java for building cross-platform applications Usage of javax.servlet for building Java web applications with servlets Usage of java.io for input and output operations in Java Description Non compliant ...
Improper authorization control for web services - RDS - Java
Need Enhancement of authorization controls for web services - RDS Context Usage of Java for building cross-platform applications Handling of IOException in Java Input/Output operations Usage of javax.servlet.ServletException for handling servlet ...
Insecure or unset HTTP headers - Referrer-Policy - Java
Need Enforcement of secure and properly configured HTTP headers Context Usage of Java 8 for developing applications with enhanced features and performance Usage of javax.servlet-api for developing Java web applications with Servlets Description Non ...
Weak CAPTCHA - Java
Need Implementation of a strong and secure CAPTCHA mechanism Context Usage of Java 1.0 for developing applications and software solutions Usage of javax.servlet.http.HttpServletRequest for handling HTTP requests in Java Servlets Usage of ...
Insecure session expiration time - Java
Need Enforce secure session expiration time Context Usage of Java 8 for developing applications with enhanced features and performance improvements Usage of javax.servlet-api for developing Java web applications with Servlets Description Non ...
Improper resource allocation - Java
Need Efficient resource allocation and management Context Usage of Java for building cross-platform applications Usage of javax.servlet for building Java web applications with servlets Usage of javax.servlet.http for handling HTTP requests and ...
Technical information leak - Console functions - Java
Need Restrict usage of console functions in production environments Context Usage of Java for building robust and scalable applications Usage of javax.servlet for building Java web applications Usage of java.io for input and output operations in Java ...
Traceability loss - Server's clock - Java
Need Ensuring accurate time synchronization with NTP servers Context Usage of Java for building robust and scalable applications Usage of java.time.LocalDateTime for handling date and time in Java Description Non compliant code import ...
Lack of data validation - Path Traversal - Java
Need Implementation of robust data validation and sanitization mechanisms Context Usage of Java for building cross-platform applications Usage of javax.servlet.http.HttpServletRequest for handling HTTP requests in Java Servlets Usage of ...
Concurrent sessions - Java
Need Enforcement of session limits and notification of concurrent sessions Context Usage of Java 8 for developing applications with enhanced features and performance Usage of javax.servlet-api for Java Servlet development Description Non compliant ...
Remote File Inclusion - Java
Need Prevention of remote file inclusion attacks Context Usage of Java for building cross-platform applications Usage of javax.servlet for Java web development with servlets and JSP Usage of java.io for input and output operations in Java Description ...
Sensitive information stored in logs - Java
Need Protection of sensitive information in log files Context Usage of Java for building cross-platform applications Usage of javax.servlet for Java Servlet development Usage of java.io for input and output operations in Java Description Non ...
Asymmetric denial of service - Content length - Java
Need Prevention of asymmetric denial of service attacks through proper validation and enforcement of Content-Length field in requests. Context Usage of Java 8 for developing applications with enhanced features and performance Usage of ...
Anonymous connection - Java
Need Restriction of anonymous connections and implementation of proper server configurations Context Usage of Java 1.8 for running Java applications Usage of javax.servlet-api for Java servlet development Description Non compliant code import ...
Lack of protection against brute force attacks - Java
Need Implementation of strong and effective brute force protection mechanisms Context Usage of Java for building cross-platform applications Usage of javax.servlet for building Java web applications Usage of javax.servlet.http for handling HTTP ...
Insecure encryption algorithm - Java
Need Implementation of secure encryption algorithms Context Usage of Java 8 for developing applications with enhanced features and performance Usage of javax.crypto.Cipher for encryption and decryption operations Usage of ...
Cracked weak credentials - Java
Need Enhanced password security and stronger credential storage Context Usage of Java for building cross-platform applications Usage of javax.servlet.http.HttpServletRequest for handling HTTP requests in Java Servlets Usage of HttpServletResponse for ...
Guessed weak credentials - Java
Need Enhancement of credential strength and protection Context Usage of Java for building robust and scalable applications Usage of javax.servlet for building Java web applications Usage of javax.servlet.http for handling HTTP requests and responses ...
Automatic information enumeration - Java
Need Prevention of automatic information enumeration and unauthorized access to sensitive data Context Usage of Java 8 for developing applications with enhanced features and performance Usage of javax.servlet for building Java web applications with ...
Insecure HTTP methods enabled - Java
Need Secure HTTP methods configuration Context Usage of Java 8 for developing applications with enhanced features and performance Usage of javax.servlet-api for building Java web applications with Servlets Description Non compliant code import ...
Insecure or unset HTTP headers - Content-Security-Policy - Java
Need Implementation of secure and properly configured Content-Security-Policy headers Context Usage of Java 8 for developing applications with enhanced features and performance Usage of javax.servlet-api for developing Java web applications with ...
Insecurely generated cookies - Java
Need Secure generation and handling of cookies Context Usage of Java for building scalable and robust applications Usage of javax.servlet.http.Cookie for handling HTTP cookies in Java Servlets Usage of HttpServletRequest for handling HTTP requests in ...
Enabled default credentials - Java
Need Enforcement of strong, unique credentials for system access Context Usage of Java for building scalable and robust applications Usage of javax.servlet.http.HttpServletRequest for handling HTTP requests in Java Servlets Usage of ...
Improper authorization control for web services - Java
Need Implementation of proper authorization control for web services Context Usage of Java 8 for developing applications with enhanced features and performance improvements. Usage of javax.servlet-api for building Java web applications with servlets ...
Business information leak - Java
Need Protection of sensitive business information from unauthorized access or leakage Context Usage of Java for building cross-platform applications Usage of javax.servlet for building Java web applications with Servlet technology Usage of java.io ...
Technical information leak - Java
Need Protection of sensitive technical information from unauthorized access Context Usage of Java for building cross-platform applications Usage of javax.servlet for building Java web applications Usage of javax.servlet.http for handling HTTP ...
Weak credential policy - Java
Need Implementation of a strong credential policy Context Usage of Java for building cross-platform applications Usage of javax.servlet.http.HttpServletRequest for handling HTTP requests in Java Servlets Usage of HttpServletResponse for handling HTTP ...
Insecure generation of random numbers - Java
Need Secure generation of random numbers Context Usage of Java 8 for developing applications with enhanced features and performance Usage of java.util.Random for generating random numbers in Java Usage of javax.servlet.http.HttpServlet for handling ...
Password change without identity check - Java
Need Enforce identity verification for password changes Context Usage of Java for building robust and scalable applications Usage of javax.servlet for building Java web applications with Servlet technology Usage of javax.servlet.http for handling ...
Sensitive information sent via URL parameters - Java
Need Protection of sensitive information during transmission Context Usage of Java 8 for developing applications with enhanced features and performance improvements. Usage of javax.servlet-api for developing Java web applications with Servlets ...
Inadequate file size control - Java
Need Enforcement of file size restrictions Context Usage of Java 8 for developing applications with enhanced features and performance improvements Usage of javax.servlet-api for developing Java web applications with servlets Usage of commons-io for ...
Insecure temporary files - Java
Need Secure handling of temporary files Context Usage of Java for building cross-platform applications Usage of java.io.* for input/output operations in Java Usage of javax.servlet for building Java web applications with Servlet technology Usage of ...
Insecure file upload - Java
Need Secure file upload and validation Context Usage of Java 8 for developing applications in the Java programming language Usage of javax.servlet-api for developing Java servlet-based web applications Usage of commons-fileupload for handling file ...
User enumeration - Java
Need Prevention of user enumeration Context Usage of Java 8 for developing applications with enhanced features and performance Usage of javax.servlet-api for building Java web applications with Servlets Description Non compliant code import ...
Uncontrolled external site redirect - Host Header Injection - Java
Need Prevention of unauthorized external site redirection Context Usage of Java 8 for developing applications with enhanced features and performance Usage of javax.servlet-api for developing Java web applications with servlets Description Non ...
Use of an insecure channel - Java
Need Secure transmission of sensitive information Context Usage of Java 8 for developing applications with enhanced features and performance improvements. Usage of javax.servlet-api for Java Servlet development Description Non compliant code import ...
XPath injection - Java
Need Prevention of XPath injection attacks Context Usage of Java for building robust and scalable applications Usage of javax.servlet for Java web application development Usage of org.w3c.dom for manipulating and interacting with the Document Object ...
Next page