6 Browser vulnerabilities 7 Network vulnerabilities 8 Authentication vulnerabilities 9 Session vulnerabilities 10 Authorization vulnerabilities 11 Payload vulnerabilities 12 Injection vulnerabilities 13 Vulnerabilities in third-party code 14 Being an unwitting accomplice 15 What to do when you get hacked