| Uncontrolled Recursion | |
| Arbitrary Code Injection | |
| Deserialization of Untrusted Data | |
| Arbitrary Code Injection | |
| Deserialization of Untrusted Data | |
| Server-Side Request Forgery (SSRF) | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Server-Side Request Forgery (SSRF) | |
| Deserialization of Untrusted Data | |
| Server-Side Request Forgery (SSRF) | |
| Arbitrary Code Injection | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Resource Exhaustion | |
| Deserialization of Untrusted Data | |
| Deserialization of Untrusted Data | |
| Resource Exhaustion | |
| Server-Side Request Forgery (SSRF) | |
| Server-Side Request Forgery (SSRF) | |
| OS Command Injection | |
| OS Command Injection | |