This flaw leveraged by malicious actors to perform DDoS, brute force, and bot attacks on APIs. Although it's more than that.
NOTE: Some organisation keep rate-limit bug as OOS, So check their policy before testing.
Rate-limit Checks
1 - Rate limit on Forget password 2 - Rate limit on Sign-up Page 3 - Rate limit on Login Page 4 - Rate limit on Invite user normal 5 - Rate limit on Invite user using MACROS 6 - Rate limit on 2FA 7 - Rate-limit on Comment and sent messages 8 - Use your own brain somewhere
Bypass-Techniques
1 - Append NULL characters at the end of the request :
%00, %0d%0a, %0d, %0a, %09, %0C, %20, ( )space
POST /signup/new/1337 HTTP/1.1
HOST: api.target.com
...
email=hacker%40gmail.com&password=12345678%00
2 - Append NULL characters at the end of the Path :