| CRLF Injection | |
| Exposure of Sensitive Information Through Metadata | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Buffer Over-read | |
| Improper Neutralization | |
| Incorrect Privilege Assignment | |
| External Control of System or Configuration Setting | |
| Improper Preservation of Consistency Between Independent Representations of Shared State | |
| Use of Less Trusted Source | |
| Time-of-check Time-of-use (TOCTOU) | |
| Missing Authorization | |
| Privilege Dropping / Lowering Errors | |
| Information Exposure | |
| Resource Exhaustion | |
| Integer Overflow or Wraparound | |
| Function Call With Incorrect Argument Type | |
| Insufficient Granularity of Access Control | |
| Improper Input Validation | |
| SQL Injection | |
| Improper Input Validation | |