Content is hidden
Sensitive Data Exposure
Insecure Storage of Sensitive Information
Broken Authentication and Session Management
Internal IP Disclosure
Improper Authentication
Broken Access Control (BAC)
Information Exposure
Weak Registration Implementation
Business Logic Errors
Path Traversal