Vulnerabilities in other authentication mechanisms

Last updated