| Use of Weak Hash | medium |
| Use of Weak Hash | medium |
| Use of Inherently Dangerous Function | low |
| Use of Hard-coded Credentials | high |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | low |
| Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | medium |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| URL Redirection to Untrusted Site ('Open Redirect') | high |
| Uncontrolled Resource Consumption | low |
| Server-Side Request Forgery (SSRF) | high |
| Sensitive Cookie Without 'HttpOnly' Flag | low |
| Sensitive Cookie Without 'HttpOnly' Flag | low |
| Sensitive Cookie with Improper SameSite Attribute | low |
| Sensitive Cookie in HTTPS Session Without 'Secure' Attribute | low |
| Sensitive Cookie in HTTPS Session Without 'Secure' Attribute | low |
| Misinterpretation of Input | low |
| Key Exchange without Entity Authentication | low |
| Interpretation Conflict | low |
| Insufficient Verification of Data Authenticity | low |
| Insecure Temporary File | low |
| Inadequate Encryption Strength | high |
| Improper Restriction of XML External Entity Reference | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Neutralization of Special Elements Used in a Template Engine | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | high |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | medium |
| Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | low |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Dynamically-Managed Code Resources | low |
| Improper Control of Dynamically-Managed Code Resources | low |
| Exposure of Sensitive Information to an Unauthorized Actor | medium |
| Exposure of Information Through Directory Listing | medium |
| Cross-Site Request Forgery (CSRF) | low |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | high |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | high |
| Cleartext Transmission of Sensitive Information | high |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Channel Accessible by Non-Endpoint | medium |
| Channel Accessible by Non-Endpoint | medium |
| Authentication Bypass by Alternate Name | medium |
| Active Debug Code | low |