Javascript

TitleSeverity
User Interface (UI) Misrepresentation of Critical Informationmedium
Use of Unmaintained Third Party Componentsmedium
Use of Password Hash With Insufficient Computational Effortmedium
Use of Incorrectly-Resolved Name or Referencemedium
Use of Incorrectly-Resolved Name or Referencemedium
Use of Hard-coded Credentialshigh
Use of Hard-coded Credentialslow
Use of Hard-coded Credentialscritical
Use of Hard-coded Credentialshigh
Use of Hard-coded Credentialshigh
Use of Hard-coded Credentialshigh
Use of Externally-Controlled Format Stringlow
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)low
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmmedium
Use of a Broken or Risky Cryptographic Algorithmhigh
URL Redirection to Untrusted Site ('Open Redirect')low
URL Redirection to Untrusted Site ('Open Redirect')high
URL Redirection to Untrusted Site ('Open Redirect')low
URL Redirection to Untrusted Site ('Open Redirect')high
URL Redirection to Untrusted Site ('Open Redirect')low
Uncontrolled Resource Consumptionlow
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)medium
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)low
Server-Side Request Forgery (SSRF)high
Server-Side Request Forgery (SSRF)medium
Server-Side Request Forgery (SSRF)medium
Server-Side Request Forgery (SSRF)medium
Server-Side Request Forgery (SSRF)medium
Server-Side Request Forgery (SSRF)medium
Server-Side Request Forgery (SSRF)low
Origin Validation Errormedium
Insufficiently Protected Credentialslow
Insufficiently Protected Credentialsmedium
Insufficiently Protected Credentialsmedium
Insufficiently Protected Credentialsmedium
Insufficiently Protected Credentialsmedium
Insufficiently Protected Credentialsmedium
Insufficiently Protected Credentialsmedium
Insufficiently Protected Credentialsmedium
Insufficiently Protected Credentialsmedium
Insufficiently Protected Credentialslow
Insufficient Verification of Data Authenticityhigh
Insufficient Verification of Data Authenticitylow
Insufficient Verification of Data Authenticitylow
Insecure Storage of Sensitive Informationlow
Insecure Storage of Sensitive Informationlow
Inefficient Regular Expression Complexitymedium
Inefficient Regular Expression Complexitymedium
Improperly Controlled Modification of Dynamically-Determined Object Attributesmedium
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improper Restriction of XML External Entity Referencelow
Improper Restriction of XML External Entity Referencelow
Improper Restriction of XML External Entity Referencelow
Improper Restriction of XML External Entity Referencemedium
Improper Restriction of XML External Entity Referencehigh
Improper Restriction of XML External Entity Referencecritical
Improper Restriction of XML External Entity Referencemedium
Improper Restriction of XML External Entity Referencemedium
Improper Restriction of Operations within the Bounds of a Memory Buffermedium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')critical
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')low
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')high
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')low
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')low
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements Used in a Template Enginemedium
Improper Neutralization of Special Elements in Data Query Logichigh
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')medium
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')medium
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')high
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')medium
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')low
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')medium
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')medium
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')high
Improper Encoding or Escaping of Outputlow
Improper Encoding or Escaping of Outputlow
Improper Encoding or Escaping of Outputlow
Improper Control of Generation of Code ('Code Injection')low
Improper Control of Generation of Code ('Code Injection')low
Improper Control of Generation of Code ('Code Injection')low
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')low
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')low
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')low
Improper Authenticationhigh
Improper Authenticationhigh
Generation of Weak Initialization Vector (IV)high
External Control of File Name or Pathhigh
Exposure of Information Through Directory Listinghigh
Deserialization of Untrusted Datalow
Deserialization of Untrusted Datacritical
Cryptographic Issuesmedium
Cryptographic Issueshigh
Cross-Site Request Forgery (CSRF)low
Cross-Site Request Forgery (CSRF)medium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationlow
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationlow
Cleartext Transmission of Sensitive Informationlow
Cleartext Transmission of Sensitive Informationmedium