Content is hidden
Brute Force
Other
Information Exposure
Using Components with Known Vulnerabilities
Critically Sensitive Data
Lack of Rate Limiting Protections (i.e. CAPTCHA)