| HTTP Request Smuggling | |
| Inefficient Regular Expression Complexity | |
| Covert Timing Channel | |
| Inefficient Regular Expression Complexity | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Validation of Specified Type of Input | |
| Resource Exhaustion | |
| Out-of-bounds Read | |
| Arbitrary Code Injection | |
| Buffer Over-read | |
| Improper Input Validation | |
| Improper Input Validation | |
| HTTP Response Splitting | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| Reliance on Cookies without Validation and Integrity Checking | |
| Resource Exhaustion | |
| Improper Handling of Syntactically Invalid Structure | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Improper Input Validation | |
| Cryptographic Issues | |
| Access Restriction Bypass | |
| Link Following | |
| Numeric Errors | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') | |
| XML External Entity (XXE) Injection | |
| HTTP Request Smuggling | |
| Directory Traversal | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Resource Exhaustion | |
| Directory Traversal | |
| Arbitrary Code Injection | |
| HTTP Response Splitting | |
| Resource Exhaustion | |
| Null Byte Interaction Error (Poison Null Byte) | |
| Improper Certificate Validation | |
| Improper Input Validation | |
| Out-of-bounds Write | |
| Heap-based Buffer Overflow | |
| Out-of-bounds Read | |
| Out-of-bounds Write | |
| Out-of-bounds Read | |
| HTTP Response Splitting | |
| Arbitrary Command Injection | |
| Improper Input Validation | |
| Improper Output Neutralization for Logs | |
| Information Exposure | |
| Inadequate Encryption Strength | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Arbitrary Argument Injection | |
| Privilege Defined With Unsafe Actions | |
| Improper Input Validation | |
| Improper Validation of Certificate with Host Mismatch | |
| Arbitrary Code Injection | |
| Cryptographic Issues | |
| Privilege Defined With Unsafe Actions | |