Content is hidden
Application-Level Denial-of-Service (DoS)
Insecure Authentication
No Rate Limiting on Form
Sensitive Client Information Disclosed
Information Exposure
Lack of Rate Limiting Protections (i.e. CAPTCHA)
CRLF Injection
Authentication Bypass