| Weak Authentication | medium |
| Use of Unmaintained Third Party Components | low |
| Use of Hard-coded Credentials | medium |
| Server-Side Request Forgery (SSRF) | medium |
| Protection Mechanism Failure | medium |
| Permissive Cross-domain Policy with Untrusted Domains | low |
| Permissive Cross-domain Policy with Untrusted Domains | low |
| Permissive Cross-domain Policy with Untrusted Domains | low |
| Omission of Security-relevant Information | medium |
| Omission of Security-relevant Information | low |
| Not Using Password Aging | medium |
| Not Using Password Aging | medium |
| Missing Encryption of Sensitive Data | medium |
| Missing Encryption of Sensitive Data | medium |
| Missing Encryption of Sensitive Data | medium |
| Missing Encryption of Sensitive Data | low |
| Missing Encryption of Sensitive Data | high |
| Missing Encryption of Sensitive Data | low |
| Missing Encryption of Sensitive Data | medium |
| Missing Encryption of Sensitive Data | low |
| Missing Encryption of Sensitive Data | medium |
| Missing Encryption of Sensitive Data | low |
| Missing Encryption of Sensitive Data | low |
| Missing Encryption of Sensitive Data | low |
| Missing Encryption of Sensitive Data | low |
| Missing Encryption of Sensitive Data | low |
| Missing Encryption of Sensitive Data | low |
| Missing Encryption of Sensitive Data | medium |
| Missing Encryption of Sensitive Data | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | medium |
| Key Management Errors | low |
| Key Management Errors | medium |
| Key Management Errors | medium |
| Key Management Errors | low |
| Key Management Errors | medium |
| Key Management Errors | low |
| Key Management Errors | medium |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | medium |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | medium |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Key Management Errors | low |
| Insufficiently Protected Credentials | medium |
| Insufficient Verification of Data Authenticity | medium |
| Insufficient Logging | low |
| Insufficient Logging | medium |
| Insufficient Logging | low |
| Insufficient Logging | low |
| Insufficient Logging | low |
| Insufficient Logging | low |
| Insufficient Logging | low |
| Insufficient Logging | low |
| Insufficient Logging | low |
| Information Loss or Omission | low |
| Incorrect Permission Assignment for Critical Resource | medium |
| Incorrect Permission Assignment for Critical Resource | medium |
| Incorrect Permission Assignment for Critical Resource | high |
| Incorrect Permission Assignment for Critical Resource | medium |
| Incorrect Permission Assignment for Critical Resource | low |
| Incorrect Permission Assignment for Critical Resource | medium |
| Incorrect Permission Assignment for Critical Resource | medium |
| Incorrect Permission Assignment for Critical Resource | low |
| Incorrect Permission Assignment for Critical Resource | medium |
| Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') | low |
| Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') | medium |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | low |
| Improper Privilege Management | low |
| Improper Privilege Management | low |
| Improper Privilege Management | low |
| Improper Privilege Management | low |
| Improper Certificate Validation | medium |
| Improper Authentication | low |
| Improper Authentication | low |
| Improper Authentication | medium |
| Improper Access Control | medium |
| Improper Access Control | medium |
| Improper Access Control | low |
| Improper Access Control | medium |
| Improper Access Control | medium |
| Improper Access Control | high |
| Improper Access Control | medium |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | medium |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Improper Access Control | low |
| Exposure of Sensitive Information to an Unauthorized Actor | low |
| Exposure of Sensitive Information to an Unauthorized Actor | low |
| Exposure of Sensitive Information to an Unauthorized Actor | low |
| Exposure of Sensitive Information to an Unauthorized Actor | low |
| Exposure of Sensitive Information to an Unauthorized Actor | low |
| Exposure of Sensitive Information to an Unauthorized Actor | medium |
| Exposure of Sensitive Information to an Unauthorized Actor | low |
| Execution with Unnecessary Privileges | medium |
| Execution with Unnecessary Privileges | low |
| Configuration | low |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | low |