We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
This finding was first detected on 2024-02-07 06:22pm GMT and is still present in the last scan performed on 2024-02-15 03:32pm GMT:
CWE-328
HashingAssignment.java:55
WebGoat/src/main/java/org/owasp/webgoat/lessons/cryptography/HashingAssignment.java
Lines 50 to 55 in 94a3226
● Training
▪ Secure Code Warrior Weak Hash Strength Training
● Videos
▪ Secure Code Warrior Weak Hash Strength Video
● Further Reading
▪ OWASP Cryptographic Storage Cheat Sheet
▪ OWASP Transport Layer Protection Cheat Sheet
▪ OWASP Password Storage Cheat Sheet
▪ OWASP Using a broken or risky cryptographic algorithm article
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Code Security Finding
This finding was first detected on 2024-02-07 06:22pm GMT and is still present in the last scan performed on 2024-02-15 03:32pm GMT:
CWE-328
HashingAssignment.java:55
Vulnerable Code
WebGoat/src/main/java/org/owasp/webgoat/lessons/cryptography/HashingAssignment.java
Lines 50 to 55 in 94a3226
1 Data Flow/s detected
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Weak Hash Strength Training
● Videos
▪ Secure Code Warrior Weak Hash Strength Video
● Further Reading
▪ OWASP Cryptographic Storage Cheat Sheet
▪ OWASP Transport Layer Protection Cheat Sheet
▪ OWASP Password Storage Cheat Sheet
▪ OWASP Using a broken or risky cryptographic algorithm article
🏴 Suppress Finding
The text was updated successfully, but these errors were encountered: