|
Content is hidden
|
Lack of Rate Limiting Protections (i.e. CAPTCHA)
|
|
Content is hidden
|
Token Leakage via Referer
|
|
Content is hidden
|
Cross-site Scripting (XSS) - Reflected
|
|
Content is hidden
|
Using Components with Known Vulnerabilities
|
|
Content is hidden
|
Violation of Secure Design Principles
|