The reshift IntelliJ plugin enables developers to find vulnerabilities in their own custom code and help them remediate with rich issue descriptions within the IDE.
Path Traversal attacks occur when the user can specify content to be written on the server. An attacker, relying on the application to pass unsanitized
Path Traversal attacks occur when the user can specify content to be written on the server. An attacker, relying on the application to pass unsanitized
Insecure Cryptography is a general vulnerability in which the encryption algorithm chosen for use cases such as authentication, integrity checks, signature verification is weak and
Information leakage is a weakness where an application reveals sensitive information such as technical details, environment details, or user-specific data. Sensitive data may be used
Hypertext Transfer Protocol (HTTP) header injection can only occur when user-supplied unsanitized data is copied into a response header. If an attacker can inject a