Clojure
| Title | Severity |
|---|---|
| Use of Weak Hash | high |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Improper Restriction of XML External Entity Reference | high |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Deserialization of Untrusted Data | medium |