• Cross-site scripting
- Reflected
- Persistent
• Overflow vulnerabilities - Buffer
- Integer
- Heap
- Stack
• Data poisoning
• Broken access control
• Cryptographic failures
• Injection flaws
• Cross-site request forgery
• Directory traversal
• Insecure design
• Security misconfiguration
• End-of-life or outdated
components
• Identification and authentication
failures
• Server-side request forgery
• Remote code execution
• Privilege escalation
• Local file inclusion (LFI)/remote
file inclusion (RFI)
