| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| Server-Side Request Forgery (SSRF) | |
| Server-Side Request Forgery (SSRF) | |
| Deserialization of Untrusted Data | |
| Allocation of Resources Without Limits or Throttling | |
| Resource Exhaustion | |
| Improper Validation of Specified Quantity in Input | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Validation of Specified Quantity in Input | |
| HTTP Request Smuggling | |
| Inefficient Regular Expression Complexity | |
| Origin Validation Error | |
| Exposed Dangerous Method or Function | |
| Allocation of Resources Without Limits or Throttling | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Arbitrary Code Injection | |
| Cross-site Scripting (XSS) | |
| Covert Timing Channel | |