Content is hidden
Unauthenticated Action
Authentication Bypass
Insecure Authentication
Broken Access Control (BAC)
Business Logic Errors
Information Exposure
Insecure Authorization
Improper Access Control
Resource Injection
Detailed Server Configuration