Authorization Bypass Through User-Controlled Key | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
XML External Entity (XXE) Injection | |
XML External Entity (XXE) Injection | |
Directory Traversal | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Exposure of Private Information ('Privacy Violation') | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Resource Exhaustion | |
Resource Exhaustion | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
HTTP Response Splitting | |
HTTP Response Splitting | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Allocation of Resources Without Limits or Throttling | |
Allocation of Resources Without Limits or Throttling | |
HTTP Request Smuggling | |
HTTP Request Smuggling | |
Resource Exhaustion | |
Incorrect Behavior Order: Early Validation | |
Resource Exhaustion | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |