| Allocation of Resources Without Limits or Throttling | |
| Improperly Controlled Modification of Dynamically-Determined Object Attributes | |
| Improper Authentication | |
| Permissive Whitelist | |
| CRLF Injection | |
| Uncontrolled Recursion | |
| HTTP Response Splitting | |
| Allocation of Resources Without Limits or Throttling | |
| Permissive Whitelist | |
| Server-Side Request Forgery (SSRF) | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Improper Encoding or Escaping of Output | |
| Unintended Proxy or Intermediary ('Confused Deputy') | |
| HTTP Response Splitting | |
| Resource Exhaustion | |
| Improper Check for Unusual or Exceptional Conditions | |
| Allocation of Resources Without Limits or Throttling | |
| Server-Side Request Forgery (SSRF) | |
| Server-Side Request Forgery (SSRF) | |
| CVE-2024-57965 | |
| Insufficient Comparison | |
| Improper Input Validation | |
| Cross-site Request Forgery (CSRF) | |
| Server-Side Request Forgery (SSRF) | |