Content is hidden
Broken Access Control (BAC)
Information Exposure
Business Logic Errors
Insecure Data Storage
Use of Hard-coded Credentials
Privilege Escalation
Sensitive Data Exposure