Injection attacks occur when languages work together to produce a system that can simultaneously serve millions of users. Each language has its own rules and syntax, which can conflict with each other based on the meaning of the symbols. Protecting from this type of attack is essential to a pleasant online experience.
Data store attacks attempt to compromise the data stored in your databases or files. This is the most consequential attack since privacy is the policy of most website owners. Once the store is successfully penetrated, the privacy is at the hands of the hacker.
Authentication attacks require more patience from a dedicated hacker. What can the user learn from incorrect login or sign-up? This attack is usually followed by access-level attacks, where the user tries to get granted access to privileged information.