Inclusion of Functionality from Untrusted Control Sphere | |
CRLF Injection | |
Exposure of Sensitive Information Through Metadata | |
Buffer Over-read | |
Improper Neutralization | |
Use of Less Trusted Source | |
Improper Preservation of Consistency Between Independent Representations of Shared State | |
External Control of System or Configuration Setting | |
Incorrect Privilege Assignment | |
Time-of-check Time-of-use (TOCTOU) | |
Missing Authorization | |
Privilege Dropping / Lowering Errors | |
Information Exposure | |
Function Call With Incorrect Argument Type | |
Integer Overflow or Wraparound | |
Resource Exhaustion | |
Insufficient Granularity of Access Control | |
Improper Input Validation | |
SQL Injection | |
Improper Input Validation | |