Hcl

TitleSeverity
Weak Authenticationmedium
Use of Unmaintained Third Party Componentslow
Use of Hard-coded Credentialsmedium
Server-Side Request Forgery (SSRF)medium
Protection Mechanism Failuremedium
Permissive Cross-domain Policy with Untrusted Domainslow
Permissive Cross-domain Policy with Untrusted Domainslow
Permissive Cross-domain Policy with Untrusted Domainslow
Omission of Security-relevant Informationmedium
Omission of Security-relevant Informationlow
Not Using Password Agingmedium
Not Using Password Agingmedium
Missing Encryption of Sensitive Datamedium
Missing Encryption of Sensitive Datamedium
Missing Encryption of Sensitive Datamedium
Missing Encryption of Sensitive Datalow
Missing Encryption of Sensitive Datahigh
Missing Encryption of Sensitive Datalow
Missing Encryption of Sensitive Datamedium
Missing Encryption of Sensitive Datalow
Missing Encryption of Sensitive Datamedium
Missing Encryption of Sensitive Datalow
Missing Encryption of Sensitive Datalow
Missing Encryption of Sensitive Datalow
Missing Encryption of Sensitive Datalow
Missing Encryption of Sensitive Datalow
Missing Encryption of Sensitive Datalow
Missing Encryption of Sensitive Datamedium
Missing Encryption of Sensitive Datalow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorsmedium
Key Management Errorslow
Key Management Errorsmedium
Key Management Errorsmedium
Key Management Errorslow
Key Management Errorsmedium
Key Management Errorslow
Key Management Errorsmedium
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorsmedium
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorsmedium
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Key Management Errorslow
Insufficiently Protected Credentialsmedium
Insufficient Verification of Data Authenticitymedium
Insufficient Logginglow
Insufficient Loggingmedium
Insufficient Logginglow
Insufficient Logginglow
Insufficient Logginglow
Insufficient Logginglow
Insufficient Logginglow
Insufficient Logginglow
Insufficient Logginglow
Information Loss or Omissionlow
Incorrect Permission Assignment for Critical Resourcemedium
Incorrect Permission Assignment for Critical Resourcemedium
Incorrect Permission Assignment for Critical Resourcehigh
Incorrect Permission Assignment for Critical Resourcemedium
Incorrect Permission Assignment for Critical Resourcelow
Incorrect Permission Assignment for Critical Resourcemedium
Incorrect Permission Assignment for Critical Resourcemedium
Incorrect Permission Assignment for Critical Resourcelow
Incorrect Permission Assignment for Critical Resourcemedium
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')low
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')medium
Inadequate Encryption Strengthlow
Inadequate Encryption Strengthlow
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthlow
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthlow
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthlow
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthlow
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthlow
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthlow
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthlow
Improper Privilege Managementlow
Improper Privilege Managementlow
Improper Privilege Managementlow
Improper Privilege Managementlow
Improper Certificate Validationmedium
Improper Authenticationlow
Improper Authenticationlow
Improper Authenticationmedium
Improper Access Controlmedium
Improper Access Controlmedium
Improper Access Controllow
Improper Access Controlmedium
Improper Access Controlmedium
Improper Access Controlhigh
Improper Access Controlmedium
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controlmedium
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Improper Access Controllow
Exposure of Sensitive Information to an Unauthorized Actorlow
Exposure of Sensitive Information to an Unauthorized Actorlow
Exposure of Sensitive Information to an Unauthorized Actorlow
Exposure of Sensitive Information to an Unauthorized Actorlow
Exposure of Sensitive Information to an Unauthorized Actorlow
Exposure of Sensitive Information to an Unauthorized Actormedium
Exposure of Sensitive Information to an Unauthorized Actorlow
Execution with Unnecessary Privilegesmedium
Execution with Unnecessary Privilegeslow
Configurationlow
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationlow