68 days left
Content is hidden
Cross-site scripting XSS
HTTP Request Smuggling
Outdated Software Version
Sensitive Data Exposure
Insecure Direct Object Reference (IDOR)
Server-Side Request Forgery (SSRF)
Use of Hard-coded Credentials