Content is hidden
Authentication Bypass
Information Exposure
OAuth Misconfiguration
Other
Unsecure Design
Tapjacking
Mobile Security Misconfiguration
Application-Level Denial-of-Service (DoS)