Content is hidden
Information Exposure
Other
No Rate Limiting on Form
Cross-site scripting XSS
Subdomain Takeover
Improper Authentication
Use of a Broken or Risky Cryptographic Algorithm