Review if the application stores sensitive information on the client-side and check if access can occur without authorization.

A detailed web application test.

A detailed web application test.

A detailed recommendations to fix the server vulnerabilities.