|
Content is hidden
|
Weak Cryptography for Passwords
|
|
Content is hidden
|
Storing Passwords in a Recoverable Format
|
|
Content is hidden
|
Unsafe Cross-Origin Resource Sharing
|
|
Content is hidden
|
Mobile Security Misconfiguration
|
|
Content is hidden
|
Violation of Secure Design Principles
|