| Uncontrolled Recursion |  | 
| Arbitrary Code Injection |  | 
| Deserialization of Untrusted Data |  | 
| Arbitrary Code Injection |  | 
| Deserialization of Untrusted Data |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Deserialization of Untrusted Data |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Arbitrary Code Injection |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Deserialization of Untrusted Data |  | 
| Deserialization of Untrusted Data |  | 
| Resource Exhaustion |  | 
| Server-Side Request Forgery (SSRF) |  | 
| Server-Side Request Forgery (SSRF) |  | 
| OS Command Injection |  | 
| OS Command Injection |  |