High
Showing all detectors for the Scala language with high severity.
The application constructs a query with inadequate neutralization of special elements, risking query logic manipulation.
Persistent cookies are vulnerable to attacks.
Security issue where software mishandles XML data from unreliable sources.
Improper Neutralization of Argument Delimiters in a Command .
The software does not validate or improperly validate host name.
User input is directly used in rendering or evaluating templates without proper validation or sanitization.
User input in setAttribute
could lead to trust boundary violation.
Insecure LDAP configuration detected.
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
Deserializing of data from untrusted sources.
The Servlet can read GET and POST parameters from various methods. The value obtained should be considered unsafe.
The product relies on random numbers or values that aren't random enough for security purposes, especially in situations where unpredictability is crucial.
Insecure cookies can lead to unencrypted transmission of sensitive data.
Improper input validation, sanitization, and access controls are can lead to path traversal vulnerabilities.
User-controlled input that specifies a link to an external site could lead to phishing attacks and allow user credentials to be stolen.
The credentials provided are not adequately protected against security threats.
Insecure usage of web service methods can enable attacks and lead to unwanted behavior.
Objects that parse or handle XML can lead to XML External Entity (XXE) attacks when misconfigured.
Cross-origin resource sharing policies that are too permissive could lead to security vulnerabilities.
External parties gain unauthorized access to files or directories via the product.
Improper Validation of Certificate with Host Mismatch.
Granting unsafe permissions can lead to security vulnerabilities.
Relying on potentially untrusted user inputs when constructing web application outputs can lead to cross-site scripting vulnerabilities.
Improper certificate validation might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client.
Disabling the HTML autoescape mechanism exposes your web applications to attacks.