Cross Site scripting
XSS attack, can create pop up window that steals user login Info to compromise other accounts.
SQL Injection
placement of malicious code
Rootkit
set of software tools that enable an unauthorized user to control a computer system.
enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software
cross site request forgery
attack that forces an end user to execute unwanted actions on web applications