Content is hidden
Information Exposure
Insecure Authentication
Mobile Security Misconfiguration
Privilege Escalation
Insecure Data Storage