| Allocation of Resources Without Limits or Throttling | |
| Improper Preservation of Permissions | |
| Exposure of System Data to an Unauthorized Control Sphere | |
| Improper Preservation of Permissions | |
| Inefficient Regular Expression Complexity | |
| Direct Request ('Forced Browsing') | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Reachable Assertion | |
| Missing Release of Resource after Effective Lifetime | |
| Reversible One-Way Hash | |
| Improper Handling of Inconsistent Special Elements | |
| Information Exposure | |
| Improper Verification of Source of a Communication Channel | |
| Incorrect Execution-Assigned Permissions | |
| HTTP Request Smuggling | |
| CRLF Injection | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Uncaught Exception | |
| Uncaught Exception | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Reversible One-Way Hash | |
| Direct Request ('Forced Browsing') | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Incorrect Execution-Assigned Permissions | |
| Improper Handling of Inconsistent Special Elements | |
| Missing Release of Resource after Effective Lifetime | |
| Reversible One-Way Hash | |
| Information Exposure | |
| Inefficient Regular Expression Complexity | |
| Executable Regular Expression Error | |
| Reachable Assertion | |
| HTTP Request Smuggling | |
| Uncaught Exception | |
| Allocation of Resources Without Limits or Throttling | |
| CRLF Injection | |
| Uncaught Exception | |
| Allocation of Resources Without Limits or Throttling | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Allocation of Resources Without Limits or Throttling | |
| Inefficient Regular Expression Complexity | |
| Time-of-check Time-of-use (TOCTOU) | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Uncaught Exception | |
| Improper Preservation of Permissions | |
| Improper Preservation of Permissions | |
| Allocation of Resources Without Limits or Throttling | |
| Uncaught Exception | |
| Exposure of System Data to an Unauthorized Control Sphere | |
| Use After Free | |
| OS Command Injection | |