Content is hidden
Other
Information Exposure
Weak Password Policy
Remote Code Execution (RCE)
Improper Authentication
Sensitive Information Leak to third-parties
Cross-site Scripting (XSS) - DOM
Subdomain Takeover
Improper Access Control
Privilege Escalation