Ruby

TitleSeverity
Use of Weak Hashmedium
Use of Weak Hashmedium
Use of Hard-coded Credentialshigh
Use of Hard-coded Credentialshigh
Use of a Broken or Risky Cryptographic Algorithmhigh
Use of a Broken or Risky Cryptographic Algorithmlow
URL Redirection to Untrusted Site ('Open Redirect')medium
URL Redirection to Untrusted Site ('Open Redirect')medium
Trusting HTTP Permission Methods on the Server Sidehigh
Server-Side Request Forgery (SSRF)medium
Sensitive Cookie Without 'HttpOnly' Flaglow
Missing Encryption of Sensitive Datamedium
Insufficiently Protected Credentialslow
Insufficiently Protected Credentialslow
Insufficiently Protected Credentialslow
Insufficient Verification of Data Authenticitylow
Inefficient Regular Expression Complexityhigh
Incorrect Regular Expressionmedium
Incorrect Default Permissionslow
Incorrect Default Permissionsmedium
Inclusion of Sensitive Information in Source Codemedium
Inadequate Encryption Strengthhigh
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improperly Controlled Modification of Dynamically-Determined Object Attributesmedium
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improperly Controlled Modification of Dynamically-Determined Object Attributeslow
Improper Restriction of XML External Entity Referencelow
Improper Restriction of XML External Entity Referencemedium
Improper Restriction of Rendered UI Layers or Frameslow
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')high
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')high
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')low
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')high
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')high
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')high
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')high
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')low
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')high
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')medium
Improper Control of Generation of Code ('Code Injection')low
Improper Control of Generation of Code ('Code Injection')high
Improper Certificate Validationhigh
Improper Access Controlmedium
External Control of File Name or Pathmedium
Exposure of Sensitive Information to an Unauthorized Actormedium
Exposure of Sensitive Information to an Unauthorized Actorlow
Divide By Zeromedium
Deserialization of Untrusted Datahigh
Deserialization of Untrusted Datamedium
Deserialization of Untrusted Datahigh
Deserialization of Untrusted Datamedium
Cross-Site Request Forgery (CSRF)low
Cross-Site Request Forgery (CSRF)low
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Cleartext Transmission of Sensitive Informationmedium
Authorization Bypass Through User-Controlled Keyhigh