| Integer Overflow or Wraparound | |
| Missing Authorization | |
| Exposure of Sensitive Information Through Metadata | |
| Buffer Over-read | |
| Improper Preservation of Consistency Between Independent Representations of Shared State | |
| Incorrect Privilege Assignment | |
| Use of Less Trusted Source | |
| Time-of-check Time-of-use (TOCTOU) | |
| Missing Authorization | |
| Integer Overflow or Wraparound | |
| Function Call With Incorrect Argument Type | |
| Resource Exhaustion | |
| Buffer Overflow | |
| SQL Injection | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Incomplete Cleanup | |
| Insufficiently Protected Credentials | |
| SQL Injection | |
| Improper Initialization | |
| Improper Authentication | |
| Insufficiently Protected Credentials | |
| Integer Overflow or Wraparound | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Calculation of Buffer Size | |
| Information Exposure | |
| Unchecked Error Condition | |
| Use After Free | |
| Improper Synchronization | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Improper Synchronization | |
| Integer Overflow or Wraparound | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| SQL Injection | |
| Information Exposure | |
| Out-of-bounds Read | |
| Permissive Whitelist | |
| Improper Input Validation | |
| SQL Injection | |
| Improper Input Validation | |
| Missing Authorization | |
| Improper Authorization | |
| Link Following | |
| Link Following | |
| Improper Input Validation | |
| Untrusted Pointer Dereference | |
| Incorrect Authorization | |