| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Directory Traversal | |
| Improper Input Validation | |
| Open Redirect | |
| Insufficiently Protected Credentials | |
| Directory Traversal | |
| Expected Behavior Violation | |
| Always-Incorrect Control Flow Implementation | |
| Resource Exhaustion | |
| Incorrect Resource Transfer Between Spheres | |
| Arbitrary Command Injection | |
| Resource Exhaustion | |
| Improper Input Validation | |
| Improper Certificate Validation | |
| Improper Certificate Validation | |
| Directory Traversal | |
| CRLF Injection | |
| Improper Certificate Validation | |