I²Cx Mobile

A wide range of vulnerabilities
Incorrect use of a platform
Insecure communication
Wrong cryptographic configurations
Insecure deserialization
Reverse engineering
Database injection
Insecure authentication
Authorization defects
Code forgery
External feature