Content is hidden
Weak 2FA Implementation (Missing Failsafe)
Insecure Authentication
Sensitive Data Exposure
Mobile Security Misconfiguration
External Behavior
Information Exposure Through an Error Message