Content is hidden
Path Traversal
Information Exposure
Sensitive Data Exposure
Business Logic Errors
Authentication Bypass
Using Components with Known Vulnerabilities