4 "category": "porous-defenses",
6 "inReviewSecurityHotspots": 0,
7 "toReviewSecurityHotspots": 0,
8 "resolvedSecurityHotspots": 0,
14 "category": "risky-resource",
16 "inReviewSecurityHotspots": 0,
17 "toReviewSecurityHotspots": 0,
18 "resolvedSecurityHotspots": 0,
24 "category": "insecure-interaction",
26 "vulnerabilityRating": 3,
27 "inReviewSecurityHotspots": 1,
28 "toReviewSecurityHotspots": 1,
29 "resolvedSecurityHotspots": 0,
34 "vulnerabilityRating": 3,
35 "inReviewSecurityHotspots": 1,
36 "toReviewSecurityHotspots": 1,
37 "resolvedSecurityHotspots": 0,