Go

TitleSeverity
Use of Weak Hashmedium
Use of Weak Hashmedium
Use of Inherently Dangerous Functionlow
Use of Hard-coded Credentialshigh
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')low
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)medium
Use of a Broken or Risky Cryptographic Algorithmmedium
Use of a Broken or Risky Cryptographic Algorithmmedium
Use of a Broken or Risky Cryptographic Algorithmmedium
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmmedium
Use of a Broken or Risky Cryptographic Algorithmmedium
Use of a Broken or Risky Cryptographic Algorithmmedium
Use of a Broken or Risky Cryptographic Algorithmmedium
URL Redirection to Untrusted Site ('Open Redirect')high
Uncontrolled Resource Consumptionlow
Server-Side Request Forgery (SSRF)high
Sensitive Cookie Without 'HttpOnly' Flaglow
Sensitive Cookie Without 'HttpOnly' Flaglow
Sensitive Cookie with Improper SameSite Attributelow
Sensitive Cookie in HTTPS Session Without 'Secure' Attributelow
Sensitive Cookie in HTTPS Session Without 'Secure' Attributelow
Misinterpretation of Inputlow
Key Exchange without Entity Authenticationlow
Interpretation Conflictlow
Insufficient Verification of Data Authenticitylow
Insecure Temporary Filelow
Inadequate Encryption Strengthhigh
Improper Restriction of XML External Entity Referencemedium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements Used in a Template Enginemedium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')medium
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')low
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Dynamically-Managed Code Resourceslow
Improper Control of Dynamically-Managed Code Resourceslow
Exposure of Sensitive Information to an Unauthorized Actormedium
Exposure of Information Through Directory Listingmedium
Cross-Site Request Forgery (CSRF)low
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationhigh
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationhigh
Cleartext Transmission of Sensitive Informationhigh
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Channel Accessible by Non-Endpointmedium
Channel Accessible by Non-Endpointmedium
Authentication Bypass by Alternate Namemedium
Active Debug Codelow