scala
Insecure object reference - Session management - Scala
Need Enhancement of session management security Context Usage of Scala 2.13 for developing scalable and high-performance applications Usage of javax.inject for dependency injection in Java applications Usage of play.api for building web applications ...
Insecure functionality - User management - Scala
Need Secure user management and access control Context Usage of Scala for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Usage of play.api.libs.json for JSON ...
Insecurely generated token - Lifespan - Scala
Need Securely generate session tokens with appropriate lifespan Context Usage of Scala for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and building web applications in Play Framework Usage of ...
Lack of data validation - HTML code - Scala
Need Ensure proper data validation and sanitization of HTML code to prevent code injection vulnerabilities. Context Usage of Scala for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and building ...
Insecurely generated token - Validation - Scala
Need Secure token generation and validation Context Usage of Scala for building scalable and functional applications Usage of play.api.mvc for handling HTTP requests in Play Framework Usage of play.api.libs.json for JSON parsing and manipulation in ...
Improper resource allocation - Memory leak - Scala
Need Proper resource management and deallocation Context Usage of Scala for building scalable and functional applications Usage of java.io.File for file input/output operations in Java Usage of java.io.FileInputStream for reading data from a file ...
Insecurely generated token - JWT - Scala
Need Secure generation and management of tokens for user creation service Context Usage of Scala for building scalable and high-performance applications Usage of javax.crypto.spec.SecretKeySpec for generating secret keys in cryptography Usage of ...
Enabled default configuration - Scala
Need Disable default configuration to prevent unauthorized access and information leakage. Context Usage of Scala for building scalable and functional applications Usage of play.api for building web applications in Scala Usage of play.api.mvc for ...
Insecure object reference - Data - Scala
Need Enforcement of proper authorization and access control mechanisms Context Usage of Scala for building scalable and high-performance applications Usage of javax.inject for Dependency Injection in Java applications Usage of Play Framework for ...
Insecure object reference - Files - Scala
Need Secure and controlled access to user files Context Usage of Scala for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and building web applications in Play Framework Usage of ...
Security controls bypass or absence - Data creation - Scala
Need Enforcement of proper security controls for data creation Context Usage of Scala for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Usage of play.api.libs.json ...
Insecure functionality - Session management - Scala
Need Secure session management Context Usage of Scala for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Description Non compliant code import play.api.mvc._ object ...
Concurrent sessions control bypass - Scala
Need Enforcement of concurrent session control Context Usage of Scala for functional and object-oriented programming in the JVM Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Description Non compliant code import ...
Authentication mechanism absence or evasion - Redirect - Scala
Need Implementation of a secure and robust authentication mechanism Context Usage of Scala 2.11 for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Description Non ...
SQL injection - Code - Scala
Need Implementation of proper input validation and the use of parameterized statements or stored procedures to prevent SQL injection attacks. Context Usage of Scala for building scalable and functional applications Usage of Anorm for type-safe ...
Insecure session management - Change Password - Scala
Need Secure session management - Close session after password change Context Usage of Scala 2.12 for developing scalable and high-performance applications Usage of play.api.mvc._ for handling HTTP requests and responses in Play Framework Description ...
Business information leak - Financial Information - Scala
Need Protection of sensitive financial information from unauthorized access or disclosure Context Usage of Scala for building scalable and functional applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Usage ...
Technical information leak - IPs - Scala
Need Prevention of internal IP address leakage Context Usage of Scala for building scalable and functional applications Usage of play.api.mvc for handling HTTP requests and building web applications in Play Framework Usage of java.net.InetAddress for ...
Technical information leak - Logs - Scala
Need Protection of sensitive technical information from unauthorized access Context Usage of Scala 2.13 for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Usage of ...
Insecure object reference - Financial information - Scala
Need Secure access to financial information Context Usage of Scala for functional and object-oriented programming in the JVM environment Usage of play.api.mvc for handling HTTP requests and building web applications in Play Framework Usage of ...
Insecure object reference - Corporate information - Scala
Need Secure handling of object references for corporate information Context Usage of Scala 2.12.10 for building scalable and high-performance applications Usage of play.api.mvc.Action for handling HTTP requests in Play Framework Usage of ...
Insecure object reference - Personal information - Scala
Need Secure access control and user authentication mechanisms Context Usage of Scala for building scalable and functional applications Usage of play.api.mvc._ for handling HTTP requests and responses in Play Framework Usage of global execution ...
Non-encrypted confidential information - Base 64 - Scala
Need Secure storage of confidential information Context Usage of Scala for building scalable and high-performance applications Usage of play.api.libs.json.Json for JSON parsing and serialization in Play Framework Usage of play.api.mvc._ for handling ...
Automatic information enumeration - Personal Information - Scala
Need Protection of user privacy and prevention of unauthorized access to personal information Context Usage of Scala 2.11 for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and responses in Play ...
Insecure encryption algorithm - ECB - Scala
Need Secure encryption algorithm implementation Context Usage of Scala for building scalable and functional applications Usage of javax.crypto.Cipher for cryptographic operations Usage of javax.crypto.spec.SecretKeySpec for generating secret keys in ...
Session Fixation - Scala
Need Prevention of session hijacking Context Usage of Scala for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and responses in the Play Framework Usage of play.api.libs.json for JSON parsing and ...
Weak credential policy - Password Expiration - Scala
Need Enforcement of password expiration policy Context Usage of Scala for building scalable and functional applications Usage of AWS Java SDK IAM for managing AWS Identity and Access Management (IAM) services Description Non compliant code import ...
Sensitive information sent via URL parameters - Session - Scala
Need Secure transmission of sensitive information in session tokens Context Usage of Scala for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Description Non ...
Restricted fields manipulation - Scala
Need Prevention of unauthorized access and manipulation of restricted fields Context Usage of Scala 2.12 for writing scalable and functional code Usage of play.api.mvc._ for handling HTTP requests and responses in Play Framework Usage of ...
Insecure functionality - Fingerprint - Scala
Need Secure and controlled user data updates Context Usage of Scala for building scalable and functional applications Usage of play.api.mvc for handling HTTP requests in Play Framework Description Non compliant code import play.api.mvc._ object ...
Insecure functionality - Masking - Scala
Need Secure data masking Context Usage of Scala for building scalable and functional applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Description Non compliant code import play.api.mvc._ object ...
Insecure functionality - Password management - Scala
Need Secure password management Context Usage of Scala 2.12 for developing scalable and high-performance applications Usage of play.api.mvc._ for handling HTTP requests and responses in Play Framework Usage of play.api.libs.json for JSON parsing and ...
Insecure functionality - File Creation - Scala
Need Enforce server-side validation and authorization for file creation functionality Context Usage of Scala for building scalable and functional applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Usage of ...
Insecure encryption algorithm - Blowfish - Scala
Need Secure encryption algorithm for protecting sensitive information Context Usage of Scala for building scalable and functional applications Usage of javax.crypto.spec.SecretKeySpec for generating a secret key specification Usage of ...
Insecure encryption algorithm - AES - Scala
Need Implementation of secure encryption algorithms Context Usage of Scala for building scalable and high-performance applications Usage of javax.crypto for cryptographic operations Description Non compliant code import javax.crypto.Cipher import ...
Insecure encryption algorithm - TripleDES - Scala
Need Implementation of secure encryption algorithms and modes Context Usage of Scala for building scalable and high-performance applications Usage of javax.crypto for cryptographic operations in Java Description Non compliant code import ...
Insecure encryption algorithm - MD5 - Scala
Need Implementation of secure encryption algorithms for password hashing Context Usage of Scala for building scalable and high-performance applications Usage of java.security.MessageDigest for cryptographic hashing and message digest operations ...
Insecure encryption algorithm - SHA1 - Scala
Need Upgrade to a secure encryption algorithm Context Usage of Scala for building scalable and high-performance applications Usage of java.security.MessageDigest for cryptographic hashing and message digest operations Description Non compliant code ...
Insecure encryption algorithm - DSA - Scala
Need Implementation of a secure encryption algorithm Context Usage of Scala for building scalable and high-performance applications Usage of KeyPairGenerator for generating cryptographic key pairs in Java security Usage of java.security.SecureRandom ...
Insecure functionality - Pass the hash - Scala
Need Secure authentication and authorization mechanisms Context Usage of Scala for building scalable and high-performance applications Usage of play.api.mvc for handling HTTP requests and responses in Play Framework Usage of play.api.libs.json for ...
Next page