Content is hidden
Information Exposure
Broken Access Control (BAC)
Unsafe Cross-Origin Resource Sharing
Server Security Misconfiguration
Insecure Direct Object Reference (IDOR)
Username Enumeration
Cache poisoning
Insecure Data Storage