FullIntroduction1. Injection2. Broken authentication3. Sensitive data exposure4 XML eXternal Entities5. Broken Access Control6. Security Misconfiguration7. XSS