SQL Injection: Exploiting database queries to gain unauthorized access.
Cross-Site Scripting (XSS): Injecting malicious scripts into web pages.
Broken Authentication: Compromising user accounts.
Sensitive Data Exposure: Unsecured personal or financial data.
Misconfigured Security Settings: Inadequate or default settings leaving systems vulnerable.