???An attacker can embed user data into a HTTP request or response, which is not sanitized.<br>+Malformed HTTP requests and responses are interpreted differently by proxies, web servers, or other systems which process HTTP along the request/response path.