Content is hidden
Use of Hard-coded Credentials
DoS
Application-Level Denial-of-Service (DoS)
Information Exposure
Other
Business Logic Errors
Improper Access Control
Cross-site scripting XSS