Overall, these practices highlight various vulnerabilities that attackers can exploit, and it is essential to address them to ensure the security of applications and systems.

Source: Cisco Certified Ethical Hacker Course