| User Interface (UI) Misrepresentation of Critical Information | medium |
| Use of Unmaintained Third Party Components | medium |
| Use of Password Hash With Insufficient Computational Effort | medium |
| Use of Incorrectly-Resolved Name or Reference | medium |
| Use of Incorrectly-Resolved Name or Reference | medium |
| Use of Hard-coded Credentials | high |
| Use of Hard-coded Credentials | low |
| Use of Hard-coded Credentials | critical |
| Use of Hard-coded Credentials | high |
| Use of Hard-coded Credentials | high |
| Use of Hard-coded Credentials | high |
| Use of Externally-Controlled Format String | low |
| Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | low |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Use of a Broken or Risky Cryptographic Algorithm | high |
| URL Redirection to Untrusted Site ('Open Redirect') | low |
| URL Redirection to Untrusted Site ('Open Redirect') | high |
| URL Redirection to Untrusted Site ('Open Redirect') | low |
| URL Redirection to Untrusted Site ('Open Redirect') | high |
| URL Redirection to Untrusted Site ('Open Redirect') | low |
| Uncontrolled Resource Consumption | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | medium |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | low |
| Server-Side Request Forgery (SSRF) | high |
| Server-Side Request Forgery (SSRF) | medium |
| Server-Side Request Forgery (SSRF) | medium |
| Server-Side Request Forgery (SSRF) | medium |
| Server-Side Request Forgery (SSRF) | medium |
| Server-Side Request Forgery (SSRF) | medium |
| Server-Side Request Forgery (SSRF) | low |
| Origin Validation Error | medium |
| Insufficiently Protected Credentials | low |
| Insufficiently Protected Credentials | medium |
| Insufficiently Protected Credentials | medium |
| Insufficiently Protected Credentials | medium |
| Insufficiently Protected Credentials | medium |
| Insufficiently Protected Credentials | medium |
| Insufficiently Protected Credentials | medium |
| Insufficiently Protected Credentials | medium |
| Insufficiently Protected Credentials | medium |
| Insufficiently Protected Credentials | low |
| Insufficient Verification of Data Authenticity | high |
| Insufficient Verification of Data Authenticity | low |
| Insufficient Verification of Data Authenticity | low |
| Insecure Storage of Sensitive Information | low |
| Insecure Storage of Sensitive Information | low |
| Inefficient Regular Expression Complexity | medium |
| Inefficient Regular Expression Complexity | medium |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | medium |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | low |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | low |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | low |
| Improper Restriction of XML External Entity Reference | low |
| Improper Restriction of XML External Entity Reference | low |
| Improper Restriction of XML External Entity Reference | low |
| Improper Restriction of XML External Entity Reference | medium |
| Improper Restriction of XML External Entity Reference | high |
| Improper Restriction of XML External Entity Reference | critical |
| Improper Restriction of XML External Entity Reference | medium |
| Improper Restriction of XML External Entity Reference | medium |
| Improper Restriction of Operations within the Bounds of a Memory Buffer | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | critical |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | low |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | medium |
| Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | high |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | high |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | low |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | low |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Neutralization of Special Elements Used in a Template Engine | medium |
| Improper Neutralization of Special Elements in Data Query Logic | high |
| Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | high |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | high |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | high |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | high |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | medium |
| Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | low |
| Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') | medium |
| Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') | medium |
| Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') | high |
| Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') | medium |
| Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') | low |
| Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | medium |
| Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | medium |
| Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | high |
| Improper Encoding or Escaping of Output | low |
| Improper Encoding or Escaping of Output | low |
| Improper Encoding or Escaping of Output | low |
| Improper Control of Generation of Code ('Code Injection') | low |
| Improper Control of Generation of Code ('Code Injection') | low |
| Improper Control of Generation of Code ('Code Injection') | low |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | low |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | low |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | medium |
| Improper Control of Generation of Code ('Code Injection') | low |
| Improper Authentication | high |
| Improper Authentication | high |
| Generation of Weak Initialization Vector (IV) | high |
| External Control of File Name or Path | high |
| Exposure of Information Through Directory Listing | high |
| Deserialization of Untrusted Data | low |
| Deserialization of Untrusted Data | critical |
| Cryptographic Issues | medium |
| Cryptographic Issues | high |
| Cross-Site Request Forgery (CSRF) | low |
| Cross-Site Request Forgery (CSRF) | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | low |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | medium |
| Cleartext Transmission of Sensitive Information | low |
| Cleartext Transmission of Sensitive Information | low |
| Cleartext Transmission of Sensitive Information | medium |