elements
SQL Injection
Reflected Cross-site Scripting
Command Injection
Vulnerable Open Source Component
Validation Required
Cryptography Poor Entropy
SQL Inyection 1
Validation Encoding Required