Get Demo
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack.