1. Cross Site Scripting (XSS)
2. Injection Flaws
3. Malicious File Execution
4. Insecure Direct Object Reference
5. Cross Site Request Forgery
6. Information Leakage And Improper Error Handling
7. Broken Authentication And Session Management
8. Insecure Cryptographic Storage
9. Insecure Communications
10. Failure To Restrict URL Access