| Improper Neutralization of Null Byte or NUL Character | |
| Failure to Sanitize Special Element | |
| Expected Behavior Violation | |
| Detection of Error Condition Without Action | |
| Improper Authentication | |
| OS Command Injection | |
| Truncation of Security-relevant Information | |
| Improper Check for Dropped Privileges | |
| Information Exposure | |
| Access Restriction Bypass | |
| Improper Neutralization of Special Elements | |
| Resource Exhaustion | |
| Covert Timing Channel | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Improper Access Control | |
| Improper Input Validation | |
| Resource Exhaustion | |
| Missing Critical Step in Authentication | |
| Use After Free | |
| Incorrect Privilege Assignment | |
| Improper Authentication | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Improper Input Validation | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Input Validation | |
| Untrusted Search Path | |
| Information Exposure | |
| Improper Authentication | |
| Arbitrary Command Injection | |
| Information Exposure | |
| User Interface (UI) Misrepresentation of Critical Information | |
| Credentials Management | |