1. SQL/NoSQL Injection
  2. Cross-Site Scripting
  3. Cross-Site Request Forgery
  4. User Enumeration
  5. Missing Brute Force Protection
  6. Credentials over Unencrypted Communication Channel
  7. Authentication Bypass
  8. Sensitive Information Disclosure
  9. Server-Side Injection Attacks
  10. Response Manipulation
  11. Parameter Pollution/Mass Assignment
  12. Insecure Direct Object Reference