Content is hidden
Unsafe File Upload
Other
Tainted Input
Subdomain Takeover
Broken Access Control (BAC)
Lack of Verification Email
Information Exposure
Cache Directives