Inventory of vulnerabilities introduced during the design process. Explore weaknesses like 'Improper Input Validation' and 'External Control of File Name or Path'.
The following inventory identifies the vulnerabilities that may be introduced during the design process.