| Uncontrolled Recursion | |
| Out-of-bounds Write | |
| Resource Exhaustion | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Arbitrary Code Injection | |
| Deserialization of Untrusted Data | |
| Server-Side Request Forgery (SSRF) | |
| Server-Side Request Forgery (SSRF) | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Arbitrary Code Injection | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Server-Side Request Forgery (SSRF) | |
| Deserialization of Untrusted Data | |
| Server-Side Request Forgery (SSRF) | |
| Deserialization of Untrusted Data | |
| Resource Exhaustion | |
| Arbitrary Code Injection | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Resource Exhaustion | |
| Server-Side Request Forgery (SSRF) | |
| OS Command Injection | |
| OS Command Injection | |
| Arbitrary Code Injection | |
| Arbitrary Command Injection | |
| Improper Input Validation | |
| Information Exposure | |