1. Cross site scripting (XSS) 2. Injection flaws 3. Malicious file execution 4. Insecure direct object reference 5. Cross site request forgery 6. Information leakage and improper error handling 7. Broken authentication and session management 8. Insecure cryptographic storage 9. Insecure communications 10. Failure to restrict URL access Written by Jakub Maslowski