| Improper Validation of Syntactic Correctness of Input |  | 
| Improper Validation of Syntactic Correctness of Input |  | 
| Arbitrary Code Injection |  | 
| Resource Exhaustion |  | 
| Incorrect Authorization |  | 
| SQL Injection |  | 
| SQL Injection |  | 
| Resource Exhaustion |  | 
| SQL Injection |  | 
| Resource Exhaustion |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Resource Exhaustion |  | 
| Race Condition |  | 
| Resource Exhaustion |  | 
| Deserialization of Untrusted Data |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Authentication Bypass by Primary Weakness |  | 
| Authentication Bypass by Primary Weakness |  | 
| Improper Authorization |  | 
| Resource Exhaustion |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Authentication Bypass |  | 
| Authentication Bypass |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Authentication Bypass by Primary Weakness |  | 
| Authentication Bypass by Primary Weakness |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| OS Command Injection |  | 
| OS Command Injection |  | 
| OS Command Injection |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| Authentication Bypass by Primary Weakness |  | 
| Authentication Bypass by Primary Weakness |  | 
| Use of Insufficiently Random Values |  | 
| Use of Insufficiently Random Values |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| LDAP Injection |  | 
| LDAP Injection |  | 
| LDAP Injection |  | 
| LDAP Injection |  | 
| LDAP Injection |  | 
| Resource Injection |  | 
| Resource Injection |  | 
| Resource Injection |  | 
| Resource Injection |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| Improper Neutralization of Special Elements |  | 
| Improper Neutralization of Special Elements |  | 
| Improper Neutralization of Special Elements |  | 
| Improper Neutralization of Special Elements |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Neutralization of Special Elements |  | 
| Improper Neutralization of Special Elements |  | 
| Improper Neutralization of Special Elements |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| Improper Neutralization of Special Elements |  | 
| Improper Neutralization of Special Elements |  | 
| Improper Neutralization of Special Elements |  | 
| Uncaught Exception |  | 
| Uncaught Exception |  | 
| Uncaught Exception |  | 
| Uncaught Exception |  | 
| Improper Initialization |  | 
| Improper Initialization |  | 
| Improper Initialization |  | 
| Improper Initialization |  | 
| Improper Initialization |  | 
| Improper Initialization |  | 
| SQL Injection |  | 
| SQL Injection |  | 
| SQL Injection |  | 
| Cleartext Transmission of Sensitive Information |  | 
| Cleartext Transmission of Sensitive Information |  | 
| Cleartext Transmission of Sensitive Information |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Out-of-bounds Read |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Incorrect Use of Privileged APIs |  | 
| Incorrect Use of Privileged APIs |  | 
| Incorrect Use of Privileged APIs |  | 
| Incorrect Use of Privileged APIs |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Deserialization of Untrusted Data |  | 
| Unchecked Return Value |  | 
| Incorrect Authorization |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Improper Resource Shutdown or Release |  | 
| SQL Injection |  | 
| SQL Injection |  | 
| Arbitrary Code Injection |  | 
| Improper Input Validation |  | 
| Insufficient Resource Pool |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Improper Input Validation |  | 
| Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Out-of-bounds Write |  | 
| Incomplete Documentation of Program Execution |  | 
| Incomplete Documentation of Program Execution |  | 
| Time-of-check Time-of-use (TOCTOU) |  | 
| Time-of-check Time-of-use (TOCTOU) |  | 
| Deserialization of Untrusted Data |  | 
| SQL Injection |  | 
| Deserialization of Untrusted Data |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| Incomplete Cleanup |  | 
| Incomplete Cleanup |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Incorrect Default Permissions |  | 
| Incorrect Default Permissions |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Static Code Injection |  | 
| Static Code Injection |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Static Code Injection |  | 
| Static Code Injection |  | 
| Static Code Injection |  | 
| Static Code Injection |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Integer Overflow or Wraparound |  | 
| Integer Overflow or Wraparound |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Use After Free |  | 
| Use After Free |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Directory Traversal |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Use of a Broken or Risky Cryptographic Algorithm |  | 
| Static Code Injection |  | 
| Static Code Injection |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Static Code Injection |  | 
| Static Code Injection |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| Information Exposure |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Out-of-Bounds |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Insufficient Session Expiration |  | 
| OS Command Injection |  | 
| OS Command Injection |  | 
| Information Exposure |  | 
| Resource Exhaustion |  | 
| Information Exposure |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Incorrect Default Permissions |  | 
| Incorrect Default Permissions |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Improper Authorization |  | 
| Improper Authorization |  | 
| XML External Entity (XXE) Injection |  | 
| XML External Entity (XXE) Injection |  | 
| Static Code Injection |  | 
| Static Code Injection |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Static Code Injection |  | 
| Static Code Injection |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  |