Java

TitleSeverity
Use of Weak Hashhigh
Use of Weak Hashhigh
Use of Weak Hashhigh
Use of Insufficiently Random Valueslow
Use of Hard-coded Credentialsmedium
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')low
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmlow
Use of a Broken or Risky Cryptographic Algorithmlow
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmhigh
URL Redirection to Untrusted Site ('Open Redirect')medium
URL Redirection to Untrusted Site ('Open Redirect')medium
Trust Boundary Violationmedium
Server-Side Request Forgery (SSRF)medium
Sensitive Cookie Without 'HttpOnly' Flaglow
Sensitive Cookie in HTTPS Session Without 'Secure' Attributelow
Reusing a Nonce, Key Pair in Encryptionhigh
Reusing a Nonce, Key Pair in Encryptionmedium
Relative Path Traversalhigh
Permissive List of Allowed Inputslow
Insufficient Verification of Data Authenticitymedium
Incorrect Type Conversion or Castlow
Incorrect Default Permissionslow
Inadequate Encryption Strengthlow
Inadequate Encryption Strengthhigh
Inadequate Encryption Strengthhigh
Inadequate Encryption Strengthhigh
Inadequate Encryption Strengthhigh
Inadequate Encryption Strengthmedium
Inadequate Encryption Strengthhigh
Improper Validation of Certificate with Host Mismatchmedium
Improper Restriction of XML External Entity Referencehigh
Improper Restriction of XML External Entity Referencehigh
Improper Restriction of XML External Entity Referencehigh
Improper Restriction of XML External Entity Referencehigh
Improper Restriction of XML External Entity Referencehigh
Improper Restriction of XML External Entity Referencehigh
Improper Restriction of XML External Entity Referencemedium
Improper Restriction of XML External Entity Referencemedium
Improper Restriction of XML External Entity Referencemedium
Improper Privilege Managementlow
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')critical
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')medium
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')medium
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')medium
Improper Neutralization of Special Elements in Data Query Logicmedium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')low
Improper Neutralization of Data within XPath Expressions ('XPath Injection')high
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')medium
Improper Neutralization of CRLF Sequences ('CRLF Injection')medium
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')low
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')high
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')low
Improper Control of Generation of Code ('Code Injection')low
Improper Control of Generation of Code ('Code Injection')low
Improper Certificate Validationlow
Improper Certificate Validationlow
Improper Authenticationmedium
Generation of Predictable IV with CBC Modehigh
External Initialization of Trusted Variables or Data Storesmedium
Exposure of Sensitive Information to an Unauthorized Actorlow
Deserialization of Untrusted Datalow
Deserialization of Untrusted Datalow
Deserialization of Untrusted Datamedium
Deserialization of Untrusted Datamedium
Deserialization of Untrusted Datamedium
Deserialization of Untrusted Datamedium
Deserialization of Untrusted Datamedium
Deserialization of Untrusted Datamedium
Cross-Site Request Forgery (CSRF)low
Cross-Site Request Forgery (CSRF)low
Cleartext Transmission of Sensitive Informationlow
Cleartext Transmission of Sensitive Informationlow
Cleartext Transmission of Sensitive Informationhigh
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationhigh
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationhigh
Cleartext Transmission of Sensitive Informationmedium