2.8.22
8 years ago
1 years ago
Known vulnerabilities in the com.typesafe.play:play_2.12 package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
com.typesafe.play:play_2.12 is a library for building scalable web applications with Java and Scala. Affected versions of this package are vulnerable to Information Exposure due to the generation of error messages containing sensitive information. Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its How to fix Information Exposure? Upgrade | [,2.8.16) |
com.typesafe.play:play_2.12 is a library for building scalable web applications with Java and Scala. Affected versions of this package are vulnerable to Security Bypass. In some situations, Play’s contentType.blackList for Cross-Site Request Forgery (CSRF) protection could be bypassed by sending a malformed Content-Type. How to fix Security Bypass? Upgrade | [2.6.0-M1,2.7.5)[2.8.0-M1,2.8.2) |