Php

TitleSeverity
Use of Weak Hashlow
Use of Potentially Dangerous Functionlow
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')medium
Use of a Broken or Risky Cryptographic Algorithmhigh
URL Redirection to Untrusted Site ('Open Redirect')low
URL Redirection to Untrusted Site ('Open Redirect')low
URL Redirection to Untrusted Site ('Open Redirect')medium
Unchecked Return Valuelow
Server-Side Request Forgery (SSRF)medium
Server-Side Request Forgery (SSRF)medium
Server-Side Request Forgery (SSRF)medium
Sensitive Cookie Without 'HttpOnly' Flaglow
Sensitive Cookie Without 'HttpOnly' Flaglow
Sensitive Cookie with Improper SameSite Attributelow
Sensitive Cookie in HTTPS Session Without 'Secure' Attributelow
Origin Validation Errorlow
Origin Validation Errorlow
Integer Overflow or Wraparoundmedium
Incorrect Comparisonlow
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')high
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')medium
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')medium
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')high
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')medium
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')medium
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')low
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')high
Improper Control of Generation of Code ('Code Injection')high
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')low
Improper Control of Generation of Code ('Code Injection')medium
Improper Authorizationlow
Improper Authorizationlow
Improper Authenticationlow
Improper Access Controlmedium
Generation of Predictable IV with CBC Modehigh
File Inclusionlow
External Control of File Name or Pathlow
Exposure of Sensitive Information to an Unauthorized Actormedium
Exposure of Sensitive Information to an Unauthorized Actorlow
Deserialization of Untrusted Datamedium
Deserialization of Untrusted Datalow
Deserialization of Untrusted Datamedium
Cross-Site Request Forgery (CSRF)low
Cross-Site Request Forgery (CSRF)low
Cleartext Transmission of Sensitive Informationlow
Cleartext Transmission of Sensitive Informationlow
Active Debug Codelow