| Use of Weak Hash | high |
| Use of Weak Hash | high |
| Use of Weak Hash | high |
| Use of Insufficiently Random Values | low |
| Use of Hard-coded Credentials | medium |
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') | low |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | low |
| Use of a Broken or Risky Cryptographic Algorithm | low |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| URL Redirection to Untrusted Site ('Open Redirect') | medium |
| URL Redirection to Untrusted Site ('Open Redirect') | medium |
| Trust Boundary Violation | medium |
| Server-Side Request Forgery (SSRF) | medium |
| Sensitive Cookie Without 'HttpOnly' Flag | low |
| Sensitive Cookie in HTTPS Session Without 'Secure' Attribute | low |
| Reusing a Nonce, Key Pair in Encryption | high |
| Reusing a Nonce, Key Pair in Encryption | medium |
| Relative Path Traversal | high |
| Permissive List of Allowed Inputs | low |
| Insufficient Verification of Data Authenticity | medium |
| Incorrect Type Conversion or Cast | low |
| Incorrect Default Permissions | low |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | high |
| Inadequate Encryption Strength | high |
| Inadequate Encryption Strength | high |
| Inadequate Encryption Strength | high |
| Inadequate Encryption Strength | medium |
| Inadequate Encryption Strength | high |
| Improper Validation of Certificate with Host Mismatch | medium |
| Improper Restriction of XML External Entity Reference | high |
| Improper Restriction of XML External Entity Reference | high |
| Improper Restriction of XML External Entity Reference | high |
| Improper Restriction of XML External Entity Reference | high |
| Improper Restriction of XML External Entity Reference | high |
| Improper Restriction of XML External Entity Reference | high |
| Improper Restriction of XML External Entity Reference | medium |
| Improper Restriction of XML External Entity Reference | medium |
| Improper Restriction of XML External Entity Reference | medium |
| Improper Privilege Management | low |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | critical |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') | medium |
| Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') | medium |
| Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') | medium |
| Improper Neutralization of Special Elements in Data Query Logic | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | high |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | high |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') | low |
| Improper Neutralization of Data within XPath Expressions ('XPath Injection') | high |
| Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') | medium |
| Improper Neutralization of CRLF Sequences ('CRLF Injection') | medium |
| Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | low |
| Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | high |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | low |
| Improper Control of Generation of Code ('Code Injection') | low |
| Improper Control of Generation of Code ('Code Injection') | low |
| Improper Certificate Validation | low |
| Improper Certificate Validation | low |
| Improper Authentication | medium |
| Generation of Predictable IV with CBC Mode | high |
| External Initialization of Trusted Variables or Data Stores | medium |
| Exposure of Sensitive Information to an Unauthorized Actor | low |
| Deserialization of Untrusted Data | low |
| Deserialization of Untrusted Data | low |
| Deserialization of Untrusted Data | medium |
| Deserialization of Untrusted Data | medium |
| Deserialization of Untrusted Data | medium |
| Deserialization of Untrusted Data | medium |
| Deserialization of Untrusted Data | medium |
| Deserialization of Untrusted Data | medium |
| Cross-Site Request Forgery (CSRF) | low |
| Cross-Site Request Forgery (CSRF) | low |
| Cleartext Transmission of Sensitive Information | low |
| Cleartext Transmission of Sensitive Information | low |
| Cleartext Transmission of Sensitive Information | high |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | high |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | high |
| Cleartext Transmission of Sensitive Information | medium |