Content is hidden
Use of Hard-coded Credentials
Sensitive Data Exposure
Improper Authentication
Server Security Misconfiguration