|The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
|The software does not neutralize or incorrectly neutralizes user-controlled input for alternate script syntax.
|The software constructs a string for a command to executed by a separate component
in another control sphere, but it does not properly delimit the
intended arguments, options, or switches within that command string.
|The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
|If elevated access rights are assigned to EJB methods, then an attacker can take advantage of the permissions to exploit the software system.
|The software constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component.
|The software uses or accesses a resource that has not been initialized.
|The software does not initialize a critical resource.
|The software does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.
|The software uses or accesses a file descriptor after it has been closed.