Ended 33 days ago
Content is hidden
Insecure Storage of Sensitive Information
Improper Access Control
Subdomain Takeover
Application-Level Denial-of-Service (DoS)
Authentication Bypass
Cross-site scripting XSS
Private API Keys
Information Exposure