Content is hidden
Authentication Bypass
Sensitive Data Exposure
No Rate Limiting on Form
Other
Key Exchange without Entity Authentication
Cross-site Scripting (XSS) - Reflected