
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url>
<loc>https://derscanner.com/about-us/</loc>
</url>
<url>
<loc>https://derscanner.com/blog/</loc>
</url>
<url>
  <loc>https://derscanner.com/product/static-application-security-testing-sast</loc>
</url>

<url>
  <loc>https://derscanner.com/product/delphi</loc>
</url>

<url>
  <loc>https://derscanner.com/product/codeQuality</loc>
</url>

<url>
  <loc>https://derscanner.com/product/dynamic-application-security-testing-dast</loc>
</url>

<url>
  <loc>https://derscanner.com/product/software-composition-analysis-sca</loc>
</url>

<url>
  <loc>https://derscanner.com/product/mobile-application-security-testing-mast</loc>
</url>

<url>
  <loc>https://derscanner.com/product/application-compliance-ow</loc>
</url>

<url>
  <loc>https://derscanner.com/partners</loc>
</url>

<url>
  <loc>https://derscanner.com/pricing</loc>
</url>

<url>
  <loc>https://derscanner.com/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/static-analysis-how-to-do-it-right/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/all-the-truth-about-static-analysis/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/how-to-integrate-a-static-analyzer-into-the-development-process/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/new-dangerous-vulnerability-discovered-in-facebook/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/new-ios-update-is-out-to-change-everything/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/wi-fi-vulnerabilities-revealed-some-dating-back-to-1997/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/researchers-android-apps-potentially-expose-data-of-millions-of-users/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/expert-explains-zero-day-vulnerabilities-and-their-widespread-dangers/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/is-eavesdropping-possible-through-smart-speakers/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/detecting-dangerous-apps-in-google-play/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/mission-impossible-let-binary-analysis-turn-black-box-into-white/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/expert-explains-how-bluetooth-is-used-to-hack-devices/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/hackers-exploiting-vulnerabilities-of-mobile-banking-apps-how-does-it-work/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/why-android-users-should-not-install-apps-from-unreliable-sources/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/lemon-duck-continues-to-evolve-how-to-protect-yourself/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/iot-market-wide-range-of-protocols/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/the-most-high-risk-mobile-vulnerabilities-and-how-to-protect-your-data/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/bluetooth-vulnerabilities-one-more-time/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/patch-me-please/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/apple-discovers-security-vulnerability-in-majority-of-its-devices/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/how-to-prevent-theft-of-iphone-notes-via-ios-vulnerability/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/vulnerabilities-in-open-source-projects-effectiveprotection/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/3-must-read-books-for-application-security-manager/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/the-role-of-automation-in-keeping-software-from-malicious-unintended-usage/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/sdlc-or-how-to-make-development-more-secure/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/interview-at-gisec-2023/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/building-a-secure-development-process-for-a-retailer-part-4-summary-of-a-major-project/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/delphi-code-analyzer/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/reducing-sast-false-positives-guide-efficient-vulnerability-management/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/easiest-way-test-mobile-app-vulnerabilities-derscanner-mast/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/testing-legacy-application-vulnerabilities-derscanner-binary-analysis/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/meeting-compliance-requirements-in-your-application-security-testing-program-with-DerScanner/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/static-code-analysis-tool-perl/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/why-delphi-praxis-is-the-ultimate-community-hub-for-delphi-developers/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/enhancing-abap-application-security-with-sast-static-code-analysis/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/enhancing-scala-security-with-derscanner-scala-static-code-analysis/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/reachability-analysis-sca/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/common-weakness-enumeration-cwe-checker/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/how-to-improve-code-quality-delphi/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/sast-scanner-a-full-guide/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/typosquatting-attacks-in-cybersecurity/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/11-examples-of-supply-chain-attacks/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/sca-vs-sast/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/best-5-static-analysis-tools-for-delphi/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/code-auto-remediation/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/ai-security-threats/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/sast-in-sdlc/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/sast-dast-and-everything-in-between-making-sense-of-appsec-technologies/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/financial-service-delphi-security-gdpr-and-pci-dss-compliance/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/healthcare-delphi-applications-hipaa-security-requirements/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/theres-ai-in-my-soup-a-critical-look-at-artificial-intelligence-in-appsec/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/twelve-months-of-appsec-year-2025-summary/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-35-release-notes/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/new-derscanner-36-released-to-support-pascal-and-integrate-with-gitlab-github-and-bitbucket/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/new-derscanner-38-released-to-provide-innovative-beta-mode-for-vulnerability-assessment/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/new-derscanner-39-supports-dart-language-and-csv-reports/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/hackers-against-mobile-banking-apps/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/how-hackers-use-bluetooth-to-attack-users-devices/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/why-it-is-dangerous-for-android-users-to-install-apps-from-unreliable-sources/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/mobile-vulnerabilities-and-data-protection/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/bluetooth-vulnerabilities-one-more-time/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/apple-discovers-security-vulnerability-in-majority-of-its-devices/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/patch-me-please/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/how-to-prevent-theft-of-iphone-notes-via-ios-vulnerability/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/building-a-secure-development-process-for-a-retailer-experience-of-a-major-project/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/costly-online-dating/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/application-security-manager-developer-or-security-offier/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/what-threats-can-smartwatches-create/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/spying-smartphones-a-myth-or-reality/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/some-faq-about-devsecops/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/using-open-source-software-for-business/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanners-vulnerability-database-now-includes-log4shell-zero-day-threats/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/android-malware-brata-attacks-mobile-banking-users/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/just-eat-takeawaycom-improves-its-product-security-with-derscanner/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/choosing-a-software-code-analyzer-why-free-solutions-turn-out-to-be-paid-twice/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/open-source-software-why-is-it-especially-insecure-today-and-how-to-protect-yourself/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-detects-vulnerabilities-and-undocumented-features-in-open-source-projects/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/spring-framework-vulnerabilities-included-in-derscanner-updated-search-database/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-311-app-security-analyzer-has-been-released/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-receives-the-cwe-compatibility-mitre-certificate/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/code-analysis-problems-solutions-prospects/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/carsharing-under-derscanner-protection/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/a-few-words-about-devsecops/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/building-a-secure-development-process-for-a-retailer-part-2-sap-applications/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/building-a-secure-development-process-for-a-retailer-experience-of-integration-with-gk-checkout-software/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-312-with-a-static-and-dynamic-software-security-analysis-correlation-module/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/first-steps-in-application-security-analysis-on-the-example-of-allsafe/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/the-new-version-of-derscanner-with-sca/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/dersecur-has-been-added-to-forrester-sast-landscape-report/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-provides-a-secure-development-process-for-a-major-auto-parts-dealer-in-the-uae/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-ensures-security-of-educational-platforms/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/ruhens-me-increases-the-security-of-corporate-systems-with-derscanner/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/dersecur-demonstrates-instant-app-vulnerability-check-at-gitex/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/use-open-source-with-confidence-the-new-supply-chain-security-by-derscanner-ensures-safety-of-third-party-components/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/dersecur-and-future-cx-announce-strategic-partnership-to-enhance-application-security-in-blockchain-and-cloud-services-with-derscanner/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/dersecur-empowers-cybersecurity-innovators-of-tomorrow-at-the-national-university-of-costa-rica-with-derscanner-technology/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-named-a-high-performer-in-g2-winter-2024-grid-reports-for-sast-dast-and-sca/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-expands-its-application-security-testing-platform-to-43-programming-languages-and-improves-open-source-security/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-participates-in-delphi-day-italy-to-support-local-developer-community/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/dersecur-recognized-among-notable-vendors-in-the-software-composition-analysis-landscape-q2-2024/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-launches-software-composition-analysis-2-0/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/dersecur-signed-distribution-agreement-with-elcore/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/dersecur-and-toyo-corporation-announce-strategic-partnership-to-launch-advanced-application-security-solution-derscanner-in-japan/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/Interview-with-daniel-chernov-for-safetydetectives/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-introduces-new-code-quality-analysis-and-major-updates-to-enhance-software-composition-analysis/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/dersecur-delivers-supply-chain-risks-training-in-isc2-singapore-chapter-event/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/dersecur-notable-vendor-static-application-security-testing-q2-2025/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/Accelerate-code-vulnerability-remediation-with-derscanner-new-offline-ai-engine/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-garini-technologies-corporation-cydes-2025-showcase-ai-appsec/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/distribution-agreement-between-derscanner-and-sos-software-service/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-123-officially-released-with-full-support-for-delphi-13/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/anthropic-detected-the-first-large-scale-ai-driven-cyberespionage-campaign/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/delphi-sca-release/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/sast-coverage-full-guide/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/join-our-upcoming-sca-webinar-with-embarcadero/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/perl-sast/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-smu-singapore/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-and-barnsten-join-forces-to-support-delphi-developers-with-native-application-security-tools/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-and-codesecure-partnership/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/derscanner-x-konto-hr/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/new-perl-ruleset/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/claude-code-security-vs-sast/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/three-women-who-shaped-appsec/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/appsec-events-calendar/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/cobol-modernization-by-ai/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/the-real-cost-of-unfixed-vulnerabilities-to-quantify-in-2026/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/compliance-deadlines/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/appsec-myths-dev-teams-believe/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/world-backup-day/</loc>
</url>

<url>
<loc>https://derscanner.com/blog/open-source-risks-examples/</loc>
</url>

<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Incorrect-comparison-with-NULL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Date-conversion</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Insecure-GRANT-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Default-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Use-of-TOP-without-ORDER-BY</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Insecure-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Command-injection-(job)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/T-SQL-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-JWT:-None-Algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Insecure-data-transmission:-Database</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Only-one-of-method-Equals()-and-GetHashCode()-defined</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unreleased-resource-database</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-ICloneable-interface</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Undocumented-feature:-security-parameters-modification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-XML-without-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Incorrect-comparison-with-NULL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-file-upload</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Incorrect-usage-of-ToString()-on-array</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Server-Side-Request-Forgery-(SSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-ASP.NET-Identity-impersonate</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Switch-missing-default</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Explicit-garbage-collection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Excessive-session-timeout</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Improper-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-ISerializable-interface-without-[Serializable]-attribute</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Missing-verification-step-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Privacy-violation-(Unmanaged-memory-usage)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Information-leak:-SignalR</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Null-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-reflection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Error-handling:-generic-exception-catch</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Mass-assignment</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unreleased-resource-stream</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Weak-JWT-signature-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Error-handling:-generic-exception</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Insecure-data-transmission-via-email</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Persistent-authentication</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-custom-SSL-implementation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Xamarin:-External-storage-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-LDAP-access-control:-anonymous-bind</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-JavaScript-framework</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-database-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-LDAP-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Asp.net-misconfiguration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Xamarin:-File-with-universal-read-or-write-access</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unminified-JavaScript</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-XSLT-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-format-string</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-XSS-due-to-insufficient-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Persistent-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-HTTP-header-manipulation-(cookies)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Obsolete-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-LDAP-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unchecked-return-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Xamarin:-JavaScript-interface-in-WebView</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Resource-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Weak-mode-for-encrypting-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Restrictions-removed:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-XQuery-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-external-file-inclusion-in-HTML</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-External-CDN-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-DNS-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-LDAP-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Error-handling:-catching-NullReferenceException</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-JSON-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Log-forging</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-XML-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Unsafe-password-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Hidden-HTML-field</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Value-shadowing</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-XPath-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Xamarin:-JavaScript-execution-allowed-in-WebView</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Typo-in-method-name</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Platform-specific-file-separator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Determining-type-via-class-name-comparison</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Setting-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Debug-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Insecure-JSON-deserialization</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-XML-external-entity-(XXE)-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-sharp-:-Xamarin:-JavaScript-execution-probably-allowed-in-WebView</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Debug-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Explicit-garbage-collection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Privacy-violation-(Unmanaged-memory-usage)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Platform-specific-file-separator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VB.NET-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Nil-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Weak-JWT-signature-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Web3:-Static-peer-manual-addition</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Undocumented-feature:-security-parameters-modification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Server-Side-Request-Forgery-(SSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Web3:-Hardcoded-sensitive-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-unsafe-package-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Web3:-Hardcoded-Infura-API-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-File-permission-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Web3:-External-node-transaction-count</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Binding-to-all-network-interfaces</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Insufficient-cost-of-a-generation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Missing-HSTS-header</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Broken-authentication-and-session-management</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Go-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Privacy-violation-(String-usage)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Null-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Null-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Unsafe-LDAP-access-control:-anonymous-bind</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Hardcoded-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-ECB-encryption-mode</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Undocumented-feature:-security-parameters-modification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Executing-commands-or-loading-libraries-from-an-untrusted-source</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Hard-code-sensitive-information</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-The-minimum-value-of-the-integer-type-may-be-exceeded</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Unsafe-access-to-environment-variables</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-The-maximum-value-of-the-integer-type-may-be-exceeded</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Call-of-System.exit()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Public-Cloneable-method-without-final-modifier-('Object-Hijack')</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Groovy-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Insufficient-authorization-check</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Unsafe-password-settings</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Obsolete-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Unchecked-return-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Unsafe-database-clients-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Loop-with-unreachable-exit-condition</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Potential-division-by-zero</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-System-fields-overwrite</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Error-bad-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-No-initial-check</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Injection-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Insecure-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/ABAP-:-Direct-database-update</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Unsafe-Azure-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Debug-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-XSS-protection-is-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Cross-site-scripting-(XSS)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Null-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Null-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Hardcoded-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Negative-content-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Unsafe-target-link</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-XPath-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Hardcoded-absolute-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Web3:-Hardcoded-sensitive-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Unsafe-internal-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Log-forging</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-XML-external-entity-(XXE)-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Web3:-Hardcoded-Infura-API-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Persistent-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-ECB-encryption-mode</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Possible-typo-when-comparing-types</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-HTTP-header-manipulation-(cookies)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Obsolete-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Mixing-template-languages</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Overly-permissive-message-posting-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-DOM-based-cross-site-scripting</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Incorrect-usage-of-block-finally</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-JavaScript-hijacking</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Incorrect-usage-of-Promise-constructor</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-SCE-mode-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Easily-guessed-database-name</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Cross-domain-requests-allowed-for-JQuery-Mobile</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Incorrect-usage-of-global-object</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/TypeScript-:-Incorrect-usage-of-control-symbol</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Dead-store</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Use-after-free</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-va_list-uninitialized</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Null-dereference</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-The-va_list-variable-overwrite-uninitialized</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Signed-integer-overflow</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-va_list-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Reference-to-array-element-out-of-bounds</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-The-va_list-variable-double-initialize</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-The-va_list-variable-self-copy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Insecure-string-API</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Incorrect-use-of-operator-sizeof</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Incorrect-usage-of-floating-point-type</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Hardcoded-sensitive-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Portability-flaw</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-function:-vfork</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Uninitialized-variable</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Null-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Hardcoded-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Incompatible-allocated-type</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Loss-of-precision</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-XML-external-entity-(XXE-injection)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Buffer-overflow</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-SSL-settings</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Dangling-internal-pointer</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-An-extra-condition-in-the-predicate</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Invalid-memory-deallocation-function-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Read-out-of-bounds</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Privacy-violation-from-a-memory-dump</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-LDAP-anonymous-binding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Variable-self-assignment</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Function-calling-with-invalid-null-argument</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-format-string</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Type-cast-error</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Invalid-buffer-size</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Incorrect-function-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Identical-expressions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Block-critical-section</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-function:-gets</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Obsolete-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unchecked-return-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-LDAP-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-function:-mktemp</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Exception-leaves-destructor</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Noreturn-function-called-in-destructor</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-File-never-closed</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-function:-mktemp</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Buffer-underflow</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Tainted-buffer-underflow</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Inefficient-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Explicitly-deprecated-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Calling-mmap-and-mprotect-functions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Double-free</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Lack-of-virtual-desctructor</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Malloc-overflow</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Garbage-memory-usage-is-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Double-close-file</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Use-of-an-uninitialized-field</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Tainted-buffer-overflow</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Use-after-move</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Memory-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Invalid-argument</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Mutex-initialize-locked</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Arithmetic-operation-on-boolean</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Mutex-double-destroy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Division-by-tainted</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Performing-the-std::move-operation-on-a-constant-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Mutex-double-initialization</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Use-of-overlapping-buffers</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Array-index-tainted</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Use-of-non-null-terminated-string</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Tainted-read-out-of-bounds</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Dangerous-pointer-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Incorrect-assignment-of-a-boolean-variable</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Uncontrolled-memory-allocation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Null-pointer-in-non-null-parameter</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Non-blocking-MPI-calls</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Redundant-condition</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Mutex-double-lock</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Destruction-of-std::thread-object-with-an-associated-thread</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Chroot()-without-chdir()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Mutex-invalid-order</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Uninitialized-MPI-request</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Calling-a-virtual-function-from-a-constructor-or-destructor</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Undefined-result</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-MPI-request-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Division-by-zero</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-function:-getpw</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Deprecated-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-function:-getlogin</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Using-an-insecure-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-DNS-lookup-usage-for-an-authentication</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Mutex-double-unlock</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Setting-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-function:-rand</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Unsafe-function:-setuid</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Invalid-mask</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Invalid-usage-of-a-variable-length-array</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Potentially-false-assertion-condition</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Run-unprivileged-code-in-privileged-mode</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Vla-taint</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Predictable-mkstemp-filename</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Mutex-destroy-locked</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Switch-missing-default</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/C-or-C++-:-Iterator-overflow</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Cross-site-scripting-(XSS)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Cursor-snarfing</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-AUTHID-unspecified</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Schema-unspecified</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Default-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Hardcoded-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-File-system-access</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Trust-boundary-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Command-injection-(job)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Unsafe-password-management</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Date-conversion</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Default-SID-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Insecure-GRANT-usage:-all-permissions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Weak-obfuscation-(wrapping)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Insecure-GRANT-usage:-execute-permission</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Dangerous-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-String-concatenation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Cookie:-long-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Incorrect-comparison-with-NULL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Obsolete-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Resource-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Global-cursor</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PL-or-SQL-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Return-value-of-transfer,-transferFrom,-or-approve-function-of-ERC-20-standard-is-always-false.</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Using-approve-function-of-the-ERC-20-token-standard</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-ERC-20-transfer-should-throw</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Prefer-external-to-public-visibility-level</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Deletion-of-dynamically-sized-storage-array</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-DoS-with-unexpected-revert-or-failed-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Use-of-call-function-with-no-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Checking-for-strict-balance-equality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Unintended-function-return</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Blockhash-function-misuse</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Non-strict-comparison-with-zero</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Send-instead-of-transfer</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Implicit-visibility-level</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Hardcoded-address</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Using-tx.origin-for-authorization</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Upgrade-code-to-Solidity-0.5.x</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Replace-multiple-return-values-with-a-struct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Costly-loop</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Redundant-fallback-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Incorrect-function-signature</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-ETH-transfer-inside-the-loop</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Output-overwrites-input-of-assembly-CALLs</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Using-continue-in-the-do-while-loop</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Compiler-version-not-fixed</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Strict-comparison-with-block.timestamp-or-now</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Use-of-unindexed-arguments-in-ERC-20-standard-events</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Use-of-return-in-constructor</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Unsafe-type-inference-in-the-for-loop</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Revert-inside-the-if-operator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Use-of-SafeMath</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Pure-functions-should-not-read-or-change-state</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Locked-money</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Deprecated-constructions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Unsafe-type-inference</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Private-modifier</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Unsafe-array's-length-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Byte-array-instead-of-bytes</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-View-function-should-not-change-state</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-msg.value-==-0-check</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Multiplication-after-division</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Extra-gas-consumption</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Overpowered-role</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Use-of-assembly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Solidity-:-Unchecked-low-level-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Unsafe-database-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBA-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Null-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Unsafe-Azure-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Cross-site-scripting-(XSS)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Debug-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-XSS-protection-is-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Missing-verification-step-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Cross-domain-requests-allowed-for-JQuery-Mobile</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Negative-content-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Null-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Web3:-Hardcoded-Infura-API-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Hardcoded-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Incorrect-usage-of-control-symbol</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-JavaScript-hijacking</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Web3:-Hardcoded-sensitive-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-ECB-encryption-mode</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Unsafe-internal-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Log-forging</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Persistent-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Incorrect-usage-of-global-object</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-HTTP-header-manipulation-(cookies)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Obsolete-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Incorrect-usage-of-Promise-constructor</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Hardcoded-absolute-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Incorrect-usage-of-block-finally</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-XML-external-entity-(XXE)-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Easily-guessed-database-name</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Overly-permissive-message-posting-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Mixing-template-languages</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Possible-typo-when-comparing-types</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-SCE-mode-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-XPath-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Unsafe-target-link</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-DOM-based-cross-site-scripting</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/JavaScript-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Text4Shell-Vulnerability</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Incorrect-directory-deletion</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Accidental-glob-extension</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Incomplete-option-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-ASP.NET-Identity-impersonate</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Insecure-components-configuration-in-Dockerfile</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Insecure-data-transmission:-Database</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Deserialization-of-untrusted-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Incorrect-array-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Persistent-authentication</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Session-fixation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-File-permission-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Remote-data-from-untrusted-source</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-XSS-due-to-insufficient-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-password-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Spring-Framework-vulnerability</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Hardcoded-computer-name</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Excessive-Privileges</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Sensitive-information-storage-in-cleartext-in-memory</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Cookie:-SameSite-None---Cross-Origin-Requests-allowed-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Excessive-permissions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-ASP.NET-misconfiguration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Server-Side-Request-Forgery-(SSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-WCF-misconfiguration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Wrong-user-settings</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Insecure-accessibility-services-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Visible-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Version-disclosure</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Improper-perception-of-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-handlers-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-interprocess-communication</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Docker-daemon-socket-exposure</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Improper-network-isolation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Debug-mode-on</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Excessive-permissions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Excessive-session-timeout</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Insecure-permissions:-write-to-external-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Backup-allowed:-custom-implementation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-SSL-settings</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Backup-allowed</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Empty-password-in-configuration-file</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Hardcoded-encryption-key-in-config</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-HTTP-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Initialization-vector-in-configuration-file</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Receiver-without-permissions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-SQL-in-DFM-file</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Undocumented-feature:-changing-the-visual-display-of-the-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Log4j-Vulnerability</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Wrong-access-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Safe-mode-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Password-hardcoded-in-configuration-file</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Path-traversal-possible-while-using-alias</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Host-spoofing</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Multiline-response-headers</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-None-in-valid-referers</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Restrictions-removed:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-API-secret-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Struts-misconfiguration:-missing-element</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Deprecated-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-PHP-misconfiguration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-SecurityManager-policy-settings</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Missing-component-permission</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-php.ini:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Struts-misconfiguration:-duplicate-element</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-password-management</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-DevTools-enabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Struts-misconfiguration:-invalid-parameters</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unsafe-configuration-of-Spring-Actuator-Endpoints</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Privilege-management:-network</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-External-information-leakage-through-error-pages</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Keyboard-caching</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-Unhidden-password-field</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Config-files-:-XML-schema-insecure-settings</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-reflection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Clipboard-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Sensitive-data-exposure-to-UI</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Use-after-free</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-File-permission-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-SSL-or-TLS-versions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Insufficient-jailbreak-detection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-stack-address</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-C-string-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-CFArrayCreate-argument</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-SSL-settings</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-UNIX-API-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Third-party-keyboard-extensions-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Information-leak-via-GET-request</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Null-argument-of-setObject:forKey:</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-format-string</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Hardcoded-sensitive-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-dispatch_once-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-authentication-(LocalAuthentication-framework)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Method-not-found</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-addObject:-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Missing-super-or-self-init</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Usage-of-openURL-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Null-value-in-collection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Lost-info-on-possible-failure</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Cast-to-incompatible-type</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Memory-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-XML-external-entity-(XXE-injection)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-NSError-null-pointer-dereference</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Insecure-manipulations-with-the-file-system</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Information-leak-when-entering-background-mode</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Invalid-dispatch-predicate</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-SSL--or--TLS-settings-using-AFNetworking</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Method-shadowing</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Missed-super-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Null-pointer-release</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-release-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Dangerous-attribute</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-CFNumber-initialization</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Use-an-variable-after-called-dealloc</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-types-of-arguments</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Null-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-malloc-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-function-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-ECB-encryption-mode</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Improper-Authorization-in-Handler-for-Custom-URL-Scheme</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-sizeof-usage-in-malloc</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Cleartext-storage-of-sensitive-information-on-disk</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Pointer-incompatible-with-malloc-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-usage-of-NSAutoreleasePool</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unused-variable</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Improper-restriction-of-power-consumption</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Autoreleased-write</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Use-an-object-with-reference-counter-after-release</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-GCD-antipattern</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Deprecated-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Index-out-of-bounds</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Direct-ivar-assignment</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Insufficient-access-control-to-the-keychain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Cryptographic-key-reused</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Lack-of-dealloc-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-NSLog-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-nil-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Missing-invalidation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Number-object-conversion</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Dealloc-synthesized</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Undefined-result</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-SMS-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-memory-management</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-autorelease</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Unsafe-internal-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Multiple-using-of-[super-dealloc]</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Inconsistent-reference-counters</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Uninitialized-variable-in-a-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Invalid-mutex-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Uninitialized-object-pointer</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Insufficient-data-protection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Mistaken-direct-release</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-release-call-in-dealloc-method-is-missed</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Incorrect-reference-counter-decrement</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Keyboard-caching</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Objective-C-:-Use-of-copy-attribute-for-a-mutable-property</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Null-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Session-fixation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-authentication</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-reflection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-File-permission-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Weak-mode-for-encrypting-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Server-Side-Request-Forgery-(SSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-JavaScript-hijacking</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Obsolete-or-unsafe-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Safe-mode-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-database-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-XSLT-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Cross-site-history-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Mass-assignment</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-sanitization-(magic-quotes)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Session-strict-mode-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Information-leak-via-GET-request</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Object-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Remote-file-operation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Register-globals</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Excessive-session-timeout</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-File-system-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Untrusted-HTTP_HOST-source</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Dynamic-loading-of-extensions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Cookie:-reliance-without-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-XSS-due-to-insufficient-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Persistent-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Undocumented-feature:-security-parameters-modification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-file-upload</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-LDAP-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-HTTP-header-manipulation-(cookies)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-DevTools-enabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Cookie-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Race-condition-of-type-TOCTOU</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Hardcoded-absolute-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Local-variable-overwrite</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Session-ID-in-URL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-password-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Setting-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Global-variable-overwrite</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-file-inclusion</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Trust-boundary-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Phar-Deserialization</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-XML-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Missing-authorization</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-CGI-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-XPath-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Unsafe-password-management</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Log-forging</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Incorrect-file-opening</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Improper-exception-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-XQuery-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Injection-JSON</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-Making-decisions-using-untrusted-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-LDAP-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/PHP-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-DOM-based-cross-site-scripting</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/LotusScript-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/VBScript-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Error-handling:-generic-exception</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Incorrect-Raise-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Error-handling:-generic-exception-catch</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Incorrect-Exit-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Obsolete-or-unsafe-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Pascal-:-Nil-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Null-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Cross-site-scripting-(XSS)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Hardcoded-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-SOSL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Apex-:-Using-an-insecure-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Hardcoded-sensitive-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Access-control-missing</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Unsafe-SecurityManager-policy-settings</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Insecure-direct-object-references</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Mass-assignment</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Nil-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Broken-authentication-and-session-management</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-OpenURI-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Hardcoded-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Timing-attack</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Weak-mode-for-encrypting-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Ruby-:-Using-"send"-version,-designed-for-testing</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Debug-mode-on</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Web3:-Deprecated-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Error-handling:-generic-exception</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-JWT:-None-Algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Server-Side-Request-Forgery-(SSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-File-permission-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Error-handling:-empty-except-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Web3:-Deprecated-class</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Null-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Weak-JWT-signature-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Unsafe-JWT-token-verification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Session-fixation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Deserialization-of-untrusted-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-XSS-protection-is-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-XML-external-entity-(XXE)-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Key-value-as-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Hardcoded-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Null-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Insecure-stream-encryption</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Reflected-XSS-in-CGI-application</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-CSP-bad-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Insecure-RSA-implementation-(BERserk-attack)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Injection-Wildcard</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Buffer-overflow</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Incorrect-hostname-verification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Race-condition-of-type-TOCTOU</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Persistent-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-HTTP-header-manipulation-(cookies)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Timing-attack</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Obsolete-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Web3:-Hardcoded-private-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Binding-to-all-network-interfaces</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Web3:-External-node-transaction-count</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Web3:-Hardcoded-Infura-API-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Unsafe-file-upload</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Assert-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Platform-specific-file-separator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-SSH-no-host-key-verification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Obsolete-or-unsafe-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Injection-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-X-Content-Type-Options:-nosniff-header-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Python-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Race-condition</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Text4Shell-Vulnerability</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-JNI-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Server-Side-Request-Forgery-(SSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unreleased-resource-stream</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Incorrect-string-comparison</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Error-handling:-generic-exception</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Privacy-violation-(String-usage)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Null-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Session-fixation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Insecure-direct-object-references</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Bad-biometric-authentication</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-access-to-environment-variables</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-JSON-deserialization-(Jackson)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Null-dereference</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-reflection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unreleased-resource-database</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Multiple-loggers-in-same-class</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Plain-storage-of-sensitive-information-in-a-cookie</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Missing-required-cryptographic-step</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-SecurityManager-checks-bypass</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-target-link</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Deprecated-class-InvokerServlet</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Method-clone()-without-Cloneable-interface</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-SecurityManager-overridable-check</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Singleton-not-thread-safe</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Error-handling:-exception-when-argument-of-type-int-takes-boundary-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Access-specifier-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Locale-dependent-result</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-XPath-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-JWT-token-verification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Deprecated-method-(ESAPI)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Timing-attack</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Calling-Thread.run()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Null-encryption-key-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-XML-decoder-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Empty-encryption-key-in-JWT-token-signature</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Null-dereference-on-some-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Explicit-garbage-collection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Error-handling:-exception-when-argument-is-null-or-empty-string</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Insecure-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Logger-not-static-final</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Negative-content-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Missing-verification-step-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Privacy-violation-in-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Error-handling:-exception-when-argument-of-type-int-takes-some-specific-values</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Hardcoded-encryption-key-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Incorrect-modifier-of-serialPersistentFields</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Usage-of-untrusted-proxy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-LDAP-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Correctness-nonfinal-public-static-field</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Error-handling:-exception-when-argument-of-type-boolean-takes-some-specific-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Non-serializable-object-in-J2EE-session</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-XSLT-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-JavaScript-hijacking</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-database-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-SSL-or-TLS-versions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Excessive-session-timeout</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-XSS-due-to-insufficient-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Log4j-Vulnerability</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Persistent-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Use-of-a-one-way-hash-with-a-predictable-Salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-JavaScript-framework</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Improper-Authorization-in-Handler-for-Custom-URL-Scheme</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-No-SecurityManager-checks-in-deserialization-methods</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-file-upload</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-No-SecurityManager-checks-in-clone()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Reflected-XSS-in-CGI-application</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Explicit-socket-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Weak-mode-for-encrypting-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-LDAP-access-control:-anonymous-bind</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Undocumented-feature:-security-parameters-modification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Method-clone()-does-not-call-super.clone()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-password-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Privileged-operation-in-public-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-database-connection-(getConnection)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-DOM-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Arbitrary-code-execution</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Only-one-of-method-Equals()-and-GetHashCode()-defined</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-database-connection-config-(Play)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-HTTP-header-manipulation-(cookies)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Incorrect-comparison-with-NULL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Resource-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Obsolete-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unchecked-return-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-JWT:-None-Algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Restrictions-removed:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Division-by-zero</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Method-finalize()-does-not-call-super.finalize()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Platform-specific-file-separator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Policy-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Call-of-notify()-in-synchronized-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Debug-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Hidden-HTML-field</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Log-forging</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Trust-boundary-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-database-connection-via-applet</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-encoding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Call-of-System.exit()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Struts2-data-tampering</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Setting-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Typo-in-method-name</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Cryptographic-key-reused</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-File-disclosure</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-DNS-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Missing-authorization</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Forgery-of-loaded-library</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Cookie:-reliance-without-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-password-management</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Reference-to-array-element-out-of-bounds</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Apache-Axis2-unsafe-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-XQuery-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Error-handling:-catching-NullPointerException</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Sensitive-data-in-redirect-parameters</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Explicit-connection-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Deserialization-of-untrusted-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Explicit-thread-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Castor-query-mode-is-not-read-only</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-SQL-injection:-parameter-tampering</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Determining-type-via-class-name-comparison</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-external-file-inclusion-in-JSP</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Error-handling:-empty-string-in-parameters-of-a-request</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-XML-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-NoSQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-custom-SSL-implementation-(trivial)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Unsafe-custom-SSL-implementation-(non-trivial)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Keyboard-caching</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Usage-of-deleteOnExit</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Castor-query-mode-undefined</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Uncontrolled-memory-allocation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-XML-external-entity-(XXE)-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-Information-leak:-screenshot</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Java-:-LDAP-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Buffer-overflow</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Null-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Weak-mode-for-encrypting-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Unchecked-return-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Undocumented-feature:-security-parameters-modification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Cookie:-not-http_only</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Obsolete-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Rust-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-Unsafe-subprogram-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-ACCEPT-keyword-using</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/COBOL-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unreleased-resource-stream</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Multiple-loggers-in-same-class</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Privacy-violation-(String-usage)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Session-fixation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Deserialization-of-untrusted-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Race-condition</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-reflection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Server-Side-Request-Forgery-(SSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-JNI-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Plain-storage-of-sensitive-information-in-a-cookie</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Insecure-direct-object-references</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-SecurityManager-checks-bypass</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Text4Shell-Vulnerability</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Missing-required-cryptographic-step</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unreleased-resource-database</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Error-handling:-generic-exception</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-JSON-deserialization-(Jackson)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Null-dereference</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Negative-content-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-JWT-token-verification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Missing-verification-step-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Usage-of-untrusted-proxy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-database-connection-config-(Play)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Method-clone()-without-Cloneable-interface</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Hardcoded-encryption-key-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Empty-encryption-key-in-JWT-token-signature</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Privacy-violation-in-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Null-encryption-key-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-database-connection-(getConnection)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-SSL-or-TLS-versions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-XSS-due-to-insufficient-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Log4j-Vulnerability</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Persistent-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Improper-Authorization-in-Handler-for-Custom-URL-Scheme</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Usage-of-deleteOnExit</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-XPath-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Method-clone()-does-not-call-super.clone()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-JavaScript-framework</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Timing-attack</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Deprecated-method-(ESAPI)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Insecure-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Access-specifier-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Platform-specific-file-separator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Call-of-System.exit()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Apache-Axis2-unsafe-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Policy-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-database-connection-via-applet</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Non-serializable-object-in-J2EE-session</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-DOM-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Method-finalize()-does-not-call-super.finalize()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-external-file-inclusion</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Log-forging</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-XML-decoder-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-DNS-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-JavaScript-hijacking</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Arbitrary-code-execution</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Only-one-of-method-Equals()-and-GetHashCode()-defined</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Calling-Thread.run()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Debug-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Struts2-data-tampering</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Setting-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-XQuery-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unchecked-return-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Use-of-a-one-way-hash-with-a-predictable-Salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-XSLT-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-password-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Information-leak:-screenshot</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Castor-query-mode-undefined</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Explicit-thread-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Incorrect-comparison-with-NULL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Excessive-session-timeout</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Castor-query-mode-is-not-read-only</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-LDAP-access-control:-anonymous-bind</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Typo-in-method-name</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Forgery-of-loaded-library</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-HTTP-header-manipulation-(cookies)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-SecurityManager-overridable-check</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Sensitive-data-in-redirect-parameters</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-File-disclosure</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Singleton-not-thread-safe</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Uncontrolled-memory-allocation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Obsolete-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Weak-mode-for-encrypting-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Reflected-XSS-in-CGI-application</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-LDAP-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Deprecated-class-InvokerServlet</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Null-dereference-on-some-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Explicit-garbage-collection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-NoSQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-file-upload</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-No-SecurityManager-checks-in-deserialization-methods</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Privileged-operation-in-public-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Resource-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-LDAP-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-No-SecurityManager-checks-in-clone()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Determining-type-via-class-name-comparison</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-password-management</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Explicit-socket-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Undocumented-feature:-security-parameters-modification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-XML-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Locale-dependent-result</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Error-handling:-catching-NullPointerException</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Call-of-notify()-in-synchronized-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Trust-boundary-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-JWT:-None-Algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-encoding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Restrictions-removed:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-XML-external-entity-(XXE)-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-SQL-injection:-parameter-tampering</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Division-by-zero</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Cookie:-reliance-without-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Missing-authorization</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Explicit-connection-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Cryptographic-key-reused</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Hidden-HTML-field</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-custom-SSL-implementation-(non-trivial)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Keyboard-caching</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-custom-SSL-implementation-(trivial)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Unsafe-access-to-environment-variables</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Scala-:-Reference-to-array-element-out-of-bounds</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Hostname-verification-is-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Executing-the-sudo-command-inside-the-application</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Two-argument-open-function-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Perl-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Incorrect-Raise-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Error-handling:-generic-exception</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Unsafe-access-to-environment-variables</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Null-dereference</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Bad-shift-size</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Incorrect-comparison</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Error-handling:-generic-exception-catch</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Identical-expressions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Unchecked-return-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Obsolete-or-unsafe-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Delphi-:-Incorrect-Exit-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Vyper-:-ERC-20-approve-issue</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Vyper-:-Use-of-as_unitless_number()-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Vyper-:-Timestamp-dependence</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Vyper-:-Locked-money</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Vyper-:-Checking-for-strict-balance-equality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Vyper-:-Redundant-default-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Vyper-:-Private-state-variable</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Debug-mode-on</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Error-handling:-generic-exception</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Visible-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-WebView-Misconfiguration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Privacy-violation-(String-usage)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Multiple-loggers-in-same-class</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unreleased-resource-stream</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Null-dereference</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-External-storage-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-File-permission-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Read-from-external-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-interprocess-communication</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-SSL-or-TLS-versions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Telephony-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-External-storage-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Intent-without-permissions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-No-hostname-verification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-SMS-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Intent-null-dereference</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-File-with-universal-read-or-write-access</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-IPC-permission-check</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-SQLite-query-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Location-data-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-AccountManager-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-SSL-socket</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-StickyBroadcast</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Receiver-without-permissions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-custom-SSL-implementation-(non-trivial)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Incorrect-rooting-detection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-custom-SSL-implementation-(trivial)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-ContentProvider-without-permissions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Broadcast-sender-without-permissions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-JavaScript-interface-in-WebView</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Arbitrary-code-execution</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-JavaScript-execution-probably-allowed-in-WebView</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Insufficient-database-access-control-(SQLite)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Device-ID-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Unsafe-internal-storage-(SharedPreferences)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-Keyboard-caching</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Android-:-JavaScript-execution-allowed-in-WebView</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Missing-required-cryptographic-step</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Logging-into-system-output</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Call-of-notify()-in-synchronized-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Privacy-violation-(String-usage)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-JSON-deserialization-(Jackson)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Insecure-direct-object-references</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Bad-biometric-authentication</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Text4Shell-Vulnerability</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Multiple-loggers-in-same-class</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Plain-storage-of-sensitive-information-in-a-cookie</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Race-condition</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Session-fixation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Error-handling:-generic-exception</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-JNI-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-SecurityManager-checks-bypass</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unreleased-resource-stream</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Deserialization-of-untrusted-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unreleased-resource-database</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Server-Side-Request-Forgery-(SSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Null-dereference</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Open-redirect</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-access-to-environment-variable-values</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-reflection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Keyboard-caching</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-JWT-token-verification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Hardcoded-encryption-key-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Log-forging</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Restrictions-removed:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Usage-of-untrusted-proxy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Negative-content-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Missing-verification-step-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Empty-encryption-key-in-JWT-token-signature</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Null-encryption-key-of-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Privacy-violation-in-JWT-token</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-SSL-or-TLS-versions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Log4j-Vulnerability</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Persistent-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-XSS-due-to-insufficient-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Improper-Authorization-in-Handler-for-Custom-URL-Scheme</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Method-clone()-without-Cloneable-interface</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Setting-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-XPath-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-SecurityManager-overridable-check</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Reflected-XSS-in-CGI-application</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Timing-attack</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Access-specifier-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Insecure-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-XML-decoder-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-No-SecurityManager-checks-in-deserialization-methods</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Call-of-System.exit()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Platform-specific-file-separator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Method-finalize()-does-not-call-super.finalize()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Undocumented-feature:-security-parameters-modification</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Forgery-of-loaded-library</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-File-disclosure</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Policy-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-database-connection-via-applet</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Null-dereference-on-some-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Undocumented-feature:-dead-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-database-connection-config-(Play)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-JavaScript-hijacking</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Debug-code</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-password-management</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-NoSQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Usage-of-deleteOnExit</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Determining-type-via-class-name-comparison</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Non-serializable-object-in-J2EE-session</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Singleton-not-thread-safe</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Excessive-session-timeout</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-DNS-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-LDAP-access-control:-anonymous-bind</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Incorrect-comparison-with-NULL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-file-upload</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-external-file-inclusion</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Typo-in-method-name</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Deprecated-method-(ESAPI)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Calling-Thread.run()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Use-of-a-one-way-hash-with-a-predictable-Salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Weak-mode-for-encrypting-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Apache-Axis2-unsafe-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-XQuery-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Trust-boundary-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-XSLT-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Struts2-data-tampering</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Uncontrolled-memory-allocation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unchecked-return-value</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-JavaScript-framework</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Obsolete-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-XML-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Castor-query-mode-is-not-read-only</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-LDAP-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-XML-external-entity-(XXE)-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-DOM-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Resource-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Explicit-connection-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Deprecated-class-InvokerServlet</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Sensitive-data-in-redirect-parameters</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Privileged-operation-in-public-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Method-clone()-does-not-call-super.clone()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Information-leak:-screenshot</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-No-SecurityManager-checks-in-clone()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Explicit-garbage-collection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Error-handling:-catching-NullPointerException</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-database-connection-(getConnection)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Only-one-of-method-Equals()-and-GetHashCode()-defined</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-HTTP-header-manipulation-(cookies)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Arbitrary-code-execution</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Castor-query-mode-undefined</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-password-storage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-LDAP-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Explicit-socket-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-encoding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Locale-dependent-result</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-JWT:-None-Algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Hidden-HTML-field</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Reference-to-array-element-out-of-bounds</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-SQL-injection:-parameter-tampering</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Division-by-zero</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Cryptographic-key-reused</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Missing-authorization</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-custom-SSL-implementation-(non-trivial)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Cookie:-reliance-without-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Unsafe-custom-SSL-implementation-(trivial)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Kotlin-:-Explicit-thread-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Null-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Memory-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Reflected-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Privileged-mode-is-enabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Unsafe-database-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Insufficient-encryption-key-length</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Incorrect-comparison-with-NULL-in-query</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Safe-mode-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Persistent-XSS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Too-long-object-name</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Incorrect-usage-of-global-object</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Unintended-function-return</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Incorrect-function-call</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Empty-code-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Obsolete-or-unsafe-function</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Unsafe-handling-parameter-"Cancel".</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Incorrect-declaration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-COM-objects-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Unsafe-access-to-environment-variables</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-XML-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Call-of-Terminate()</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-JSON-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/1C-:-Execute-stored-procedure</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Error-bad-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Unsafe-database-access-control</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Obsolete-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Unsafe-file-upload</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Path-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Setting-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Resource-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Trust-boundary-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Visual-Basic-6-:-XSS-due-to-insufficient-validation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-Missing-required-cryptographic-step</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-Cross-site-request-forgery-(CSRF)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-Hidden-HTML-field</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-Unsafe-Flash-application-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-Unsafe-cross-origin-resource-sharing-(CORS)-policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-Password-transfer-via-GET-form</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-Unsafe-target-link</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/HTML5-:-Form-validation-is-disabled</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Nill-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Hardcoded-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Empty-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Clipboard-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-WebView-misuse</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unsafe-padding</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Privacy-violation-(Unmanaged-memory-usage)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Weak-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Nil-salt</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Error-handling:-empty-catch-block</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-WebView-Misconfiguration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Weak-seed-of-random-number-generator</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Missing-jailbreak-detection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Insecure-configuration-of-the-keychain-Access-Policy</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Third-party-keyboard-extensions-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Insecure-manipulations-with-the-file-system</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Hardcoded-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unsafe-Keychain-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unsafe-authentication-(LocalAuthentication-framework)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Information-leak-when-entering-background-mode</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unsafe-SSL-settings</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Information-leak-via-GET-request</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unencrypted-DNS</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Undocumented-feature:-network-activity</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Bad-biometric-authentication</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Null-initialization-vector</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Undocumented-feature:-time-bomb</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Hardcoded-HMAC-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Hardcoded-sensitive-data</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-XML-external-entity-(XXE-injection)</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-DOS-attack-via-regular-expressions-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Usage-of-openURL-method</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Insufficient-number-of-iterations</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unsafe-SSL-configuration</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-ECB-encryption-mode</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Undocumented-feature:-hidden-functionality</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-HMAC-using-weak-hashing-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Weak-encryption-algorithm</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Usage-of-TCP-without-multipath</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-SQL-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Keyboard-caching</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Missing-memory-release</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Empty-HMAC-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Deprecated-construct</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Command-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Internal-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unsafe-SMS-handling</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-NSLog-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-DOS-attack-possible</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-nil-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Sensitive-data-exposure-to-UI</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unsafe-reflection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Empty-encryption-key</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Read-sensitive-data-from-disk</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Improper-restriction-of-power-consumption</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-External-storage-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Insecure-preview-using</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Cookie:-unlimited-expiration-time</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Improper-Authorization-in-Handler-for-Custom-URL-Scheme</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Sensitive-functionality-exposure-through-IPC</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unsafe-URL-parameters</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-JSON-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Privacy-violation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-External-information-leak</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-HTTP-header-manipulation</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Code-injection</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Swift-:-Unsafe-SSL-or-TLS-versions</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-Cookie:-broad-domain</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-Cookie:-broad-path</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-Undocumented-feature:-special-account</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-Hardcoded-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-HTTP-usage</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-Empty-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-Cookie:-not-HttpOnly</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-Null-password</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-Cookie:-transmission-not-over-SSL</loc>
</url>
            
<url>
<loc>https://derscanner.com/vulnerability-database/Dart-:-Unhidden-password-field</loc>
</url>
            </urlset>