| Directory Traversal | |
| Inefficient Regular Expression Complexity | |
| Improper Preservation of Permissions | |
| Uncaught Exception | |
| Exposure of System Data to an Unauthorized Control Sphere | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Uncaught Exception | |
| Improper Preservation of Permissions | |
| Improper Preservation of Permissions | |
| Allocation of Resources Without Limits or Throttling | |
| Uncaught Exception | |
| Exposure of System Data to an Unauthorized Control Sphere | |
| Allocation of Resources Without Limits or Throttling | |
| Time-of-check Time-of-use (TOCTOU) | |
| Allocation of Resources Without Limits or Throttling | |
| Use After Free | |
| OS Command Injection | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Memory Leak | |
| Resource Exhaustion | |
| Incorrect Authorization | |
| Memory Leak | |
| Uncaught Exception | |
| Use After Free | |