Vulnerable and Outdated Components Read More Insecure Design Read More Cross-Site Scripting Read More Security Misconfiguration Read More Broken Access Control Read More Server Side Request Forgery Read More