Almost all vulnerabilities are either direct applications of known patterns, incremental extensions of them, or chains of multiple such steps.