Content is hidden
Text Injection
Command Injection
DoS
Sensitive Token in URL
Information Exposure
Violation of Secure Design Principles
No Rate Limiting on Form