Content is hidden
Other
Authenticated Action
Token Leakage via Referer
Cross-site Scripting (XSS) - Reflected
Information Exposure
Lack of Security Headers
Action-Specific
Using Components with Known Vulnerabilities
Violation of Secure Design Principles