Content is hidden
Sensitive Information Leak to third-parties
Use of Hard-coded Credentials
Business Logic Errors
Sensitive Data Exposure
Reentrancy
Broken Access Control (BAC)
Unsafe File Upload
Insecure Authorization