| Incorrect Authorization | |
| Improper Privilege Management | |
| Stack-based Buffer Overflow | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Information Exposure | |
| Improper Input Validation | |
| Heap-based Buffer Overflow | |
| Privilege Defined With Unsafe Actions | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Improper Input Validation | |
| Improper Protection against Electromagnetic Fault Injection (EM-FI) | |
| Improper Output Neutralization for Logs | |
| Improper Output Neutralization for Logs | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Privilege Management | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Reliance on Untrusted Inputs in a Security Decision | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Incomplete Blacklist | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Heap-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Stack-based Buffer Overflow | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Privilege Defined With Unsafe Actions | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Improper Access Control | |
| Improper Access Control | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Time-of-check Time-of-use (TOCTOU) | |
| Link Following | |