Content is hidden
Cache poisoning
Insecure Storage of Sensitive Information
Sensitive Data Hardcoded
Sensitive Data Exposure
Information Exposure
Improper Access Control
Path Traversal
Remote Code Execution (RCE)