Skip to main content
5 votes
3 answers
397 views

I learned that in C++, array arguments decay to pointer arguments. As a result, void PrintArray(int arr[4]) { std::cout << arr[0] << std::endl; std::cout << arr[1] << ...
Jason Cho's user avatar
  • 247
0 votes
3 answers
96 views

In Java, if a user input is directly appended to an SQL query without using methods like setString() or setInt(), but the query is executed using a PreparedStatement, is it still considered SQL ...
Uday Patel's user avatar
0 votes
1 answer
169 views

I'm trying to understand sharing encrypted messages using PHP's sodium crypto box. Using an example that I found somewhere I've tried to simulate a conversation between two people. They each have ...
Ron Matuszek's user avatar
0 votes
1 answer
170 views

I would like to learn how to implement secure boot on a device. I have a raspberry pi 2, and 3. I can get any board if it is required. I have been working with embedded systems and embedded linux. ...
Payam30's user avatar
  • 729
-1 votes
1 answer
66 views

If I save the password to the database as a hash in the configuration file of the application or in the code for security reasons, how does the application connect to the database if it does not ...
Leo's user avatar
  • 1
-1 votes
1 answer
352 views

Veracode scan is showing a low level vulnerability in the fetch function. What's the best way to fix this? const response = await fetch(url, { method: 'POST', headers: { 'Content-Type': '...
vbgp's user avatar
  • 71
0 votes
1 answer
217 views

I got a message in log 'NSKeyedUnarchiveFromData' should not be used to for un-archiving and will be removed in a future release. I am not sure how to convert this class to use NSSecureCoding. I am ...
John Doe's user avatar
  • 2,531
0 votes
0 answers
61 views

2023-10-17 00:21:31.357 Uncaught app exception Traceback (most recent call last): File "D:\pythonProject\portfolio\send_email.py", line 21, in send_email server.login(username, password) ...
Nitya Oberoi's user avatar
0 votes
0 answers
153 views

So I'm asking about this here purely because I can't find any guidelines/explanation for how this works anywhere else. I am trying to clear a memory buffer after use to prevent a leak of highly ...
vibhav950's user avatar
0 votes
1 answer
2k views

I have a Microservice with an rest endpoint to receive data. I will secure this endpoint not with a user/Password rather with an JWT Token. The secret from this token is known to this service. I take ...
Nerospeed's user avatar
  • 191
1 vote
1 answer
305 views

Snyk.io has alerted me to a CWE-502 issue with a Swift class that implements Codable. Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without ...
Scott McKenzie's user avatar
0 votes
0 answers
166 views

I'm looking for way to delete secure files if a program were to crash in any way. Is there a way to do this in python? I've been looking at the tempfile module to see if this were possible. Looking it ...
Philip Liu's user avatar
0 votes
0 answers
129 views

Scan shows "Trust Bound Violation" in Session Variables for the below code. How to sanitize or validate the below getDate()? Not able to use the regular ESAPI validator as getDate() is type ...
Alice Smith's user avatar
0 votes
1 answer
252 views

Dears, How to add password to Tab in order to open it's content ? I want to keep Tab1(Mobiles) and Tab3 (Computers) accessible and the other ones request password each time we click on them : Below is ...
PyiPath2022's user avatar
0 votes
1 answer
636 views

So basically I have some information which I have gathered with lot of effort, this information is not specific to user so I cannot totally depend on my user logged in token, this is somewhat some ...
Sandeep Bisht's user avatar

15 30 50 per page
1
2 3 4 5
15