Content is hidden
Insecure Authorization
Sensitive Data Exposure
Insecure Authentication
Cleartext Storage of Sensitive Information
Authentication Bypass
Tainted Input
Insecure Data Storage
Other