Content is hidden
Other
Allows Disposable Email Addresses
Information Exposure Through Debug Information
Unsecure Design
Business Logic Errors
Insecure Authentication
Information Exposure
Insecure Data Storage
Improper Access Control