Content is hidden
Information Exposure
Open Redirect
Violation of Secure Design Principles
Weak 2FA Implementation (Missing Failsafe)
Business Logic Errors
Improper Access Control
Insecure Direct Object Reference (IDOR)
Subdomain Takeover