|
Content is hidden
|
Broken Access Control (BAC)
|
|
Content is hidden
|
Critically Sensitive Data
|
|
Content is hidden
|
Broken Access Control (BAC)
|
|
Content is hidden
|
Broken Access Control (BAC)
|
|
Content is hidden
|
Key Exchange without Entity Authentication
|
|
Content is hidden
|
Violation of Secure Design Principles
|
|
Content is hidden
|
Unsafe Cross-Origin Resource Sharing
|