Content is hidden
Sensitive Data Exposure
Weak 2FA Implementation (Missing Failsafe)
Broken Access Control (BAC)
Improper Access Control
Insecure Data Storage