🔒AUTHENTICATION
Authentication BypassLack of Password Confirmation2FA Code Brute-forceableLack of VerificationLack of Throttling on Form SubmissionsLack of Rate Limiting on LoginWeak Password Complexity RulesSESSION MANAGEMENTACCESS CONTROL
Last updated