| Expected Behavior Violation |  | 
| Expected Behavior Violation |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Inefficient Regular Expression Complexity |  | 
| Cross-site Scripting (XSS) |  | 
| Link Following |  | 
| Time-of-check Time-of-use (TOCTOU) |  | 
| Inefficient Regular Expression Complexity |  | 
| Open Redirect |  | 
| Use of Insufficiently Random Values |  | 
| CVE-2025-4673 |  | 
| HTTP Request Smuggling |  | 
| Inefficient Regular Expression Complexity |  | 
| Improper Input Validation |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| HTTP Request Smuggling |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| HTTP Request Smuggling |  | 
| Cross-site Scripting (XSS) |  | 
| Origin Validation Error |  | 
| Exposed Dangerous Method or Function |  | 
| Improper Access Control |  | 
| Cross-site Scripting (XSS) |  | 
| Incomplete Filtering of Special Elements |  | 
| HTTP Request Smuggling |  | 
| Improper Input Validation |  | 
| Arbitrary Code Injection |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Improper Verification of Cryptographic Signature |  | 
| Information Exposure |  | 
| Arbitrary Argument Injection |  | 
| Resource Exhaustion |  | 
| CRLF Injection |  | 
| Improper Handling of Exceptional Conditions |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Improper Verification of Cryptographic Signature |  | 
| Resource Exhaustion |  | 
| Improper Verification of Cryptographic Signature |  | 
| Improper Verification of Cryptographic Signature |  | 
| Improper Verification of Cryptographic Signature |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Cross-site Scripting (XSS) |  | 
| Improper Verification of Cryptographic Signature |  | 
| Use of Uninitialized Variable |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Use of Uninitialized Variable |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Insufficient Compartmentalization |  | 
| Insufficiently Protected Credentials |  | 
| Missing Required Cryptographic Step |  | 
| Improper Verification of Cryptographic Signature |  | 
| Improper Input Validation |  | 
| Misinterpretation of Input |  | 
| Improper Input Validation |  | 
| Authentication Bypass |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Memory Leak |  | 
| Misinterpretation of Input |  | 
| Improper Input Validation |  | 
| Arbitrary Code Injection |  | 
| Improper Input Validation |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Buffer Access with Incorrect Length Value |  | 
| Cross-site Scripting (XSS) |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Cross-site Scripting (XSS) |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Authentication Bypass by Primary Weakness |  | 
| Inefficient Regular Expression Complexity |  | 
| Resource Exhaustion |  | 
| Information Exposure |  | 
| Loop with Unreachable Exit Condition ('Infinite Loop') |  | 
| Arbitrary Code Injection |  | 
| Resource Exhaustion |  | 
| Inefficient Regular Expression Complexity |  | 
| Inefficient Regular Expression Complexity |  | 
| Inefficient Regular Expression Complexity |  | 
| Resource Exhaustion |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| External Control of Assumed-Immutable Web Parameter |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Incorrect Implementation of Authentication Algorithm |  | 
| Information Exposure |  | 
| Inefficient Regular Expression Complexity |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| CVE-2022-39201 |  | 
| Insufficiently Protected Credentials |  | 
| Improper Verification of Cryptographic Signature |  | 
| CVE-2022-41715 |  | 
| CVE-2022-41715 |  | 
| CVE-2022-41715 |  | 
| CVE-2022-41715 |  | 
| CVE-2022-41715 |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| Authentication Bypass |  | 
| Inefficient Regular Expression Complexity |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Inefficient Regular Expression Complexity |  | 
| Resource Exhaustion |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| Improperly Controlled Sequential Memory Allocation |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| HTTP Request Smuggling |  | 
| Directory Traversal |  | 
| Open Redirect |  | 
| Insufficient Entropy |  | 
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Missing Release of Resource after Effective Lifetime |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Incorrect Authorization |  | 
| Incorrect Authorization |  | 
| Incorrect Authorization |  | 
| Incorrect Authorization |  | 
| Incorrect Authorization |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Cross-site Request Forgery (CSRF) |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Information Exposure |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Directory Traversal |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Authorization Bypass Through User-Controlled Key |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Misinterpretation of Input |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Arbitrary Argument Injection |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Incorrect Permission Assignment for Critical Resource |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Cross-site Scripting (XSS) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Incorrect Calculation |  | 
| Improper Certificate Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  | 
| Missing Authorization |  |