- SQL Injection
- Command Injection
- Cross Site Scripting (XSS)
- Cross Site Request Forgery (CSRF)
- File Upload Vulnerability
- Insecure Direct Object References (IDOR)
- Session Fixation
- Identification and Authentication Failures
- Business Logic Vulnerabilities