| Incorrect Privilege Assignment | |
| Improper Authentication | |
| Improper Verification of Cryptographic Signature | |
| Execution with Unnecessary Privileges | |
| Incorrect Privilege Assignment | |
| Insufficient Granularity of Access Control | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Improper Verification of Cryptographic Signature | |
| Insufficient Granularity of Access Control | |
| Incorrect Privilege Assignment | |
| Improper Verification of Cryptographic Signature | |
| Improper Authentication | |
| Link Following | |
| Execution with Unnecessary Privileges | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |
| Insecure Temporary File | |