Broken Access Control: Allow unauthorized user to access restricted resources
Cryptographic Failures: Attackers can target sensitive data such as credit card number, password, and personal information when you don't protect them properly
Injection: Attackers attempt to send data in a way that will change the meaning of commands being sent to interpreter for bad purpose
Insecure Design: The lack of security controls being integrated into application throughout development cycle. For example, WordPress do not set limits for the unsuccessful login attempt on the admin panel, therefore attackers can expose to brute force attack
Security Misconfiguration: When system or application configuration settings are missing or erroneously implemented, which leads to allowing unauthorized access
Vulnerable and Outdated Component: Third-party libraries or frameworks that is known vulnerabilities or no longer supported by their developer.
Identification and Authentication Failures: It leaves the application susceptible to attack and leaves user account and data at risk
Software and Data Integrity: Relate to code and infrastructure that does not protect against integrity violation
Logging and Monitoring Failures: Where logging and monitoring system are inadequate to identify and responds to incident
Server-Side Request Forgery: Attackers attempts to attack server functionality to access or modify resources
Read about OWASP Top 10