| Integer Overflow or Wraparound | |
| Missing Authorization | |
| Exposure of Sensitive Information Through Metadata | |
| CRLF Injection | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Buffer Over-read | |
| External Control of System or Configuration Setting | |
| Improper Neutralization | |
| Time-of-check Time-of-use (TOCTOU) | |
| Missing Authorization | |
| Privilege Dropping / Lowering Errors | |
| Integer Overflow or Wraparound | |
| Resource Exhaustion | |
| Function Call With Incorrect Argument Type | |
| Buffer Overflow | |
| SQL Injection | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Incomplete Cleanup | |
| Insufficiently Protected Credentials | |
| SQL Injection | |
| Stack-based Buffer Overflow | |
| Race Condition | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| Integer Overflow or Wraparound | |
| Improper Authentication | |
| Improper Input Validation | |
| Numeric Errors | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Resource Management Errors | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| SQL Injection | |
| Improper Input Validation | |
| Incorrect Calculation of Buffer Size | |
| Information Exposure | |
| Cryptographic Issues | |
| Unchecked Error Condition | |
| Use After Free | |
| Improper Synchronization | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Improper Synchronization | |
| Stack-based Buffer Overflow | |
| Access Restriction Bypass | |
| Integer Overflow or Wraparound | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| SQL Injection | |
| Information Exposure | |
| Out-of-bounds Read | |
| Permissive Whitelist | |
| Improper Input Validation | |
| SQL Injection | |
| Improper Input Validation | |
| Missing Authorization | |
| Improper Authorization | |
| Link Following | |
| Link Following | |
| Improper Input Validation | |
| Untrusted Pointer Dereference | |
| Incorrect Authorization | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Arbitrary Code Injection | |