+ 2) – CWE-‐16 Configura?on – CWE-‐20 Improper Input Valida?on – CWE-‐22 Path Traversal – CWE-‐78 OS Command Injec?on – CWE-‐79 Cross-‐site Scrip?ng – CWE-‐89 SQL Injec?on – CWE-‐93 CRLF Injec?on – CWE-‐113 HTTP Response Splixng – CWE-‐200 Informa?on Exposure – CWE-‐264 Permissions, Privileges, and Access Controls