Java
🐞 non-compliance
✅ compliance
🐞 non-compliance
✅ compliance
Cross-Site Request Forgery (CSRF)
🐞 non-compliance
✅ compliance
Use of Hard-coded Password
🐞 non-compliance
✅ compliance
Broken or Risky Crypto Algorithm
🐞 non-compliance
✅ compliance
Insufficient Entropy
🐞 non-compliance
✅ compliance
XSS
🐞 non-compliance
✅ compliance
SQL Injection
🐞 non-compliance
✅ compliance
External Control of File Name or Path
🐞 non-compliance
✅ compliance
🐞 non-compliance
✅ compliance
unprotected storage of credentials
🐞 non-compliance
✅ compliance
Trust Boundary Violation
🐞 non-compliance
✅ compliance
Insufficiently Protected Credentials
🐞 non-compliance
✅ compliance
Restriction of XML External Entity Reference
🐞 non-compliance
✅ compliance
Vulnerable and Outdated Components
🐞 non-compliance
✅ compliance
Improper Validation of Certificate with Host Mismatch
🐞 non-compliance
✅ compliance
Improper Authentication
🐞 non-compliance
✅ compliance
Session Fixation
🐞 non-compliance
✅ compliance
Inclusion of Functionality from Untrusted Control
🐞 non-compliance
✅ compliance
Download of Code Without Integrity Check
🐞 non-compliance
✅ compliance
Deserialization of Untrusted Data
🐞 non-compliance
✅ compliance
Insufficient Logging
🐞 non-compliance
✅ compliance
Improper Output Neutralization for Logs
🐞 non-compliance
✅ compliance
🐞 non-compliance
✅ compliance
🐞 non-compliance
✅ compliance
Server-Side Request Forgery (SSRF)
🐞 non-compliance
✅ compliance