SQL Injection: Exploiting database queries to gain unauthorized access.
							    
 Cross-Site Scripting (XSS): Injecting malicious scripts into web pages.
							    
 Broken Authentication: Compromising user accounts.
							    
 Sensitive Data Exposure: Unsecured personal or financial data.
							     
 Misconfigured Security Settings: Inadequate or default settings leaving systems vulnerable.