Insidious Inputs - Three Types of Common Software Vulnerabilities (...