| HTTP Response Splitting | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Request Smuggling | |
| Out-of-bounds Read | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Request Smuggling | |
| Out-of-bounds Read | |
| HTTP Response Splitting | |
| HTTP Request Smuggling | |
| Out-of-bounds Read | |
| HTTP Response Splitting | |
| HTTP Request Smuggling | |
| Out-of-bounds Read | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| HTTP Request Smuggling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Initialization | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| HTTP Request Smuggling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Initialization | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Output Neutralization for Logs | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Output Neutralization for Logs | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Output Neutralization for Logs | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Output Neutralization for Logs | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Output Neutralization for Logs | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Output Neutralization for Logs | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Output Neutralization for Logs | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Output Neutralization for Logs | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Output Neutralization for Logs | |
| HTTP Response Splitting | |
| Improper Input Validation | |
| HTTP Response Splitting | |
| Improper Input Validation | |
| HTTP Response Splitting | |
| Improper Input Validation | |
| HTTP Response Splitting | |
| Improper Input Validation | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| HTTP Request Smuggling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Initialization | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| HTTP Request Smuggling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Initialization | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Request Smuggling | |
| Out-of-bounds Read | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Request Smuggling | |
| Out-of-bounds Read | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Request Smuggling | |
| Out-of-bounds Read | |
| Server-Side Request Forgery (SSRF) | |
| Improper Output Neutralization for Logs | |
| Improper Authentication | |
| Improper Access Control | |
| Improper Input Validation | |
| Memory Leak | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| HTTP Request Smuggling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Initialization | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| HTTP Request Smuggling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Initialization | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| HTTP Request Smuggling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Initialization | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| HTTP Response Splitting | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Improper Input Validation | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Request Smuggling | |
| Out-of-bounds Read | |
| Insufficient Verification of Data Authenticity | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| HTTP Request Smuggling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Initialization | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Improper Input Validation | |
| Improper Encoding or Escaping of Output | |
| Improper Input Validation | |
| Improper Encoding or Escaping of Output | |
| Improper Input Validation | |
| Improper Encoding or Escaping of Output | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Encoding or Escaping of Output | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| Inclusion of Functionality from Untrusted Control Sphere | |
| Improper Encoding or Escaping of Output | |
| NULL Pointer Dereference | |
| Improper Encoding or Escaping of Output | |
| Improper Input Validation | |
| Improper Encoding or Escaping of Output | |
| HTTP Response Splitting | |
| Improper Input Validation | |
| Out-of-bounds Read | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Out-of-bounds Read | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Insufficient Verification of Data Authenticity | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Information Exposure | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Improper Initialization | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |
| Integer Overflow or Wraparound | |