| Authorization Bypass Through User-Controlled Key | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| XML External Entity (XXE) Injection | |
| XML External Entity (XXE) Injection | |
| Directory Traversal | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Exposure of Private Information ('Privacy Violation') | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| HTTP Response Splitting | |
| HTTP Response Splitting | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| HTTP Request Smuggling | |
| HTTP Request Smuggling | |
| Resource Exhaustion | |
| Incorrect Behavior Order: Early Validation | |
| Resource Exhaustion | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |