Content is hidden
Weak Cryptography for Passwords
Heap Overflow
Information Exposure
Insecure Authentication
Mobile Security Misconfiguration
Privilege Escalation
Insecure Data Storage