SQL injection Authentication 취약점 Directory traversal OS command injection Business logic 취약점 Information disclosure 취약점 Access control