Five common Web application vulnerabilities