Other vulnerabilities exist because of a flaw in the data filtering. Peer code reviews, greedy filtering rules, and a general understanding of how data moves within your application can decrease the likelihood of such flaws.