|
Content is hidden
|
Mobile Security Misconfiguration
|
|
Content is hidden
|
Violation of Secure Design Principles
|
|
Content is hidden
|
Weak Password Recovery Mechanism for Forgotten Password
|
|
Content is hidden
|
Broken Authentication and Session Management
|
|
Content is hidden
|
Weak 2FA Implementation (Missing Failsafe)
|
|
Content is hidden
|
Cross-Site Request Forgery (CSRF)
|
|
Content is hidden
|
Server Security Misconfiguration
|