The application does not record or display information that
would be important for identifying the source or nature of an attack, or
determining if an action is safe.
The software does not fully clear previously used information
in a data structure, file, or other resource, before making that resource
available to a party in another control sphere.
The software uses external input to construct a pathname that
should be within a restricted directory, but it does not properly neutralize
sequences such as ".." that can resolve to a location that is outside of that
directory.
The software does not handle or incorrectly handles when a
parameter, field, or argument name is specified, but the associated value is
missing, i.e. it is empty, blank, or null.