Content is hidden
Subdomain Takeover
Information Exposure
Use of a Broken or Risky Cryptographic Algorithm
Insecure Data Storage
Unsecure Design
Sensitive Data Exposure
Broken Access Control (BAC)