Jsou zde rozebrány následující hrozby:
- Excessive Privilege Abuse
- Legitimate Privilege Abuse
- Privilege Elevation
- Database Platform Vulnerabilities
- SQL Injection
- Weak Audit Trail
- Denial of Service
- Database Communication Protocol Vulnerabilities
- Weak Authentication
- Backup Data Exposure