Content is hidden
Insecure Data Transport
Blind SQL injection
Broken Access Control (BAC)
Insecure Authorization
Mobile Security Misconfiguration
Key Exchange without Entity Authentication
No Rate Limiting on Form
Information Exposure
Business Logic Errors