Validating vulnerabilities with HTTP interaction