Scala detectors
Showing all detectors for the Scala language.
Browse by tags
Browse all detectors by tags.
Browse by severity
Browse all detectors by severity.
Browse by category
Browse all detectors by category.
Browse all detectors
The application constructs a query with inadequate neutralization of special elements, risking query logic manipulation.
Persistent cookies are vulnerable to attacks.
Security issue where software mishandles XML data from unreliable sources.
Improper Neutralization of Argument Delimiters in a Command .
The software does not validate or improperly validate host name.
Use of insecure cryptography
User input is directly used in rendering or evaluating templates without proper validation or sanitization.
User input in setAttribute
could lead to trust boundary violation.
Insecure LDAP configuration detected.
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
Deserializing of data from untrusted sources.
The Servlet can read GET and POST parameters from various methods. The value obtained should be considered unsafe.
The product relies on random numbers or values that aren't random enough for security purposes, especially in situations where unpredictability is crucial.
Insecure cookies can lead to unencrypted transmission of sensitive data.
RSA algorithm does not incorporate Optimal Asymmetric Encryption Padding (OAEP), which might weaken the encryption.
Improper input validation, sanitization, and access controls are can lead to path traversal vulnerabilities.
User-controlled input that specifies a link to an external site could lead to phishing attacks and allow user credentials to be stolen.
Array Index Validation Failure enables attackers to execute code or cause a denial of service by manipulating array index values.
The credentials provided are not adequately protected against security threats.
Insecure usage of web service methods can enable attacks and lead to unwanted behavior.
Objects that parse or handle XML can lead to XML External Entity (XXE) attacks when misconfigured.
Cross-origin resource sharing policies that are too permissive could lead to security vulnerabilities.
External parties gain unauthorized access to files or directories via the product.
Improper Validation of Certificate with Host Mismatch.
Granting unsafe permissions can lead to security vulnerabilities.
Relying on potentially untrusted user inputs when constructing web application outputs can lead to cross-site scripting vulnerabilities.
Improper certificate validation might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client.
Disabling the HTML autoescape mechanism exposes your web applications to attacks.