Content is hidden
Sensitive Data Exposure
No Rate Limiting on Form
Broken Access Control (BAC)
Insecure Direct Object Reference (IDOR)
DoS
Authentication Bypass
Lack of Password Confirmation
Blockchain