the request, the success of the request will have same response all over. • Due to this, you can get the valid response from any user and completely copy paste it with other user. • Vulnerabilities in this case are easy to exploit and hence has a higher severity. • In this case, in response there will be something unique to identify or differentiate the user, like token, user id, etc. • Due to this, you have to get the valid response from the user and completely copy paste it with same user. • Vulnerabilities in this case are not easy to exploit and hence has a very low severity UNIQUE RESPONSe BASED Common Response Based Complete Response Manipulation