Attention!!! All given examples has security weaknesses.
Each login page has its own security mechanisms. Your mission is to break them and get in.