Memory
|
Insecure Data Storage |
100 |
|
JWT Misconfiguration
|
Web Application |
100 |
|
Client Side Validation Bypass
|
Web Application |
100 |
|
Server Fingerprint
|
Web Application |
100 |
|
Encoding - Hashing
|
Web Application |
100 |
|
Login bypass
|
Web Application |
100 |
|
SQL Injection
|
Content Providers |
100 |
|
File System Expose
|
Content Providers |
100 |
|
SQLite Databases (Unencrypted)
|
Insecure Data Storage |
100 |
|
WTF Logs
|
Logs |
100 |
|
Verbose Logs
|
Logs |
100 |
|
Debug Logs
|
Logs |
100 |
|
Warnings Logs
|
Logs |
100 |
|
Error Logs
|
Logs |
100 |
|
Informational Logs
|
Logs |
100 |
|
Backdoor3
|
Miscellaneous |
100 |
|
Backdoor2
|
Miscellaneous |
100 |
|
Backdoor1
|
Miscellaneous |
100 |
|
Caesar Cipher
|
Encryption |
100 |
|
HTTPS Traffic
|
HTTP Traffic |
100 |
|
HTTP Traffic
|
HTTP Traffic |
100 |
|
Sanity Check Flag
|
Sanity Check |
0 |
|