| Cross-site Scripting (XSS) | |
| HTTP Request Smuggling | |
| Allocation of Resources Without Limits or Throttling | |
| Arbitrary Argument Injection | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| Misinterpretation of Input | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Directory Traversal | |
| Resource Exhaustion | |
| Improper Handling of Unicode Encoding | |
| Cross-site Scripting (XSS) | |
| HTTP Response Splitting | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Arbitrary Code Injection | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Buffer Overflow | |