Content is hidden
Information Exposure
Sensitive Application Data Stored Unencrypted
Improper Access Control