Vulnerabilities Included:
Improper Credential Usage
Inadequate Supply Chain Security
Insecure Authentication
Insecure Authorization
Insufficient Input/Output Validation
Insufficient Binary Protection
Security Misconfiguration
Inadequate Privacy Controls
Insecure Storage
Insecure Cryptography
Debug Enabled
Insecure Intent
Malicious Intent
Unprotected Exported Activity
Intent hijacking vulnerability
Improper URL Validation
Hardcoded Secrets
Insecure Logging
Bypass SSL Pinning
Reverse Engineering