Home / Vulnerability Database / Scala : SQL injection: parameter tampering
Scala
Scala : SQL injection: parameter tampering
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
Overview
The application executes an SQL query using a parameter received from the user without additional filtering. An attacker could gain access to information about other users. With such a direct request for information, for example, by bank account number, an attacker can steal confidential information (for example, a bank account balance) using a direct link to the object.
LOW
DerScanner Severity Score
Do you want to fix Scala : SQL injection: parameter tampering in your application?
See also
Scala
Scala : Unreleased resource stream
Scala
Scala : Multiple loggers in same class
Scala
