Abusing JWT key identifier and breaking out of a Docker container
Chaining XSS, SSRF, and deserialization vulnerabilities to get RCE