Content is hidden
Information Exposure
Privilege Escalation
Authentication Bypass
DoS
Broken Access Control (BAC)
Sensitive Application Data Stored Unencrypted
Shared Links
Deserialization of Untrusted Data