Content is hidden
Information Exposure
Insecure Authorization
Spoof HTML Content
Login Credentials
Subdomain Takeover
Homograph/IDN-Based
Unsecure Design
Sensitive Client Information Disclosed
Timestamp Dependence