Question: Type of vulnerability and also correct the code. options are listed below 1 package com.scw.airplaneshop.util; import lombok. extern.log4j.Log4j; import javax.servlet.http.HttpServletRequest; 6 import javax.xmi.bind.DatatypeConverter; 7 import

 Type of vulnerability and also correct the code. options are listed

below 1 package com.scw.airplaneshop.util; import lombok. extern.log4j.Log4j; import javax.servlet.http.HttpServletRequest; 6 import javax.xmi.bind.DatatypeConverter;

7 import java.io. Fileinputstream; 8 import java.io. IOException; 9 import java.io.UnsupportedEncodingException; 10

Type of vulnerability and also correct the code. options are listed below

import java.security. Messagedigest; 11 import java.security.NoSuchA1gorithmExceptions 12 import java.uti1.0ptionaly 13 import java.uti1.

1 package com.scw.airplaneshop.util; import lombok. extern.log4j.Log4j; import javax.servlet.http.HttpServletRequest; 6 import javax.xmi.bind.DatatypeConverter; 7 import java.io. Fileinputstream; 8 import java.io. IOException; 9 import java.io.UnsupportedEncodingException; 10 import java.security. Messagedigest; 11 import java.security.NoSuchA1gorithmExceptions 12 import java.uti1.0ptionaly 13 import java.uti1. Propertiess 15 import static com, scw, airpianeshop, uti1, Constants. EMPTYSTRING; 7 og4j 18 public final class Utils t private final static Sterins condh = ", " public final static Stain: REPiEFILE = "sre/main/resources/appidcation.properties 5 private static Properies propentes final String xfileder = requet . othectar (x= riangi ); if (xrizader = nu11) t return raquet.ojthiziotedid()s fionliznild a rit 3 public static optionalestring gethescriptioniath() \{ return optional.otinlmble(cetproperties() - Eeteroperty ("con.scw.airplaneshop.discription.path"))s Select Vulnerability Category Identily the type of vulnerability present in the code and select it from the options below. The vilneroble files and lines of code hove been marked with 0. Security Misconfiguration Dehug Feetures Enrhtid Cross site Request Forgery Injection Fliws Desedilization of Untrusted Data submit

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!