Content is hidden
Use of Hard-coded Cryptographic Key
Business Logic Errors
Insecure Data Storage
Authentication Bypass