#java
Read more stories on Hashnode
Articles with this tag
This is part three of a series on the security implication of Spring Actuators. I recommend having read at least the first part to understand the...
In the first part of this series, we have discussed the risks inherent in exposing the Actuator functionality of the Spring framework. If you haven't...
Spring is a set of frameworks for developing Applications in Java. It is widely used, and so it is not unusual to encounter it during a security audit...