| Use of Weak Hash | medium |
| Use of Hard-coded Credentials | medium |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Use of a Broken or Risky Cryptographic Algorithm | medium |
| Sensitive Cookie Without 'HttpOnly' Flag | low |
| Sensitive Cookie in HTTPS Session Without 'Secure' Attribute | low |
| Reusing a Nonce, Key Pair in Encryption | low |
| Incorrect Type Conversion or Cast | low |
| Inadequate Encryption Strength | low |
| Inadequate Encryption Strength | high |
| Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | medium |
| Improper Authentication | medium |
| Cleartext Transmission of Sensitive Information | low |