Content is hidden
Information Exposure
Use of Hard-coded Credentials
Filter/Signature Evasion
Server Security Misconfiguration
Broken Access Control (BAC)
Code Injection
Other
Insecure Authentication
HTTP Request Smuggling