Use of Hard-coded Credentials | |
Use of Hard-coded Credentials | |
Security Features | |
Missing Authentication for Critical Function | |
Missing Authentication for Critical Function | |
Missing Authentication for Critical Function | |
Missing Authentication for Critical Function | |
Improper Authorization | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Incorrect Permission Assignment for Critical Resource | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Information Exposure | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |