Last updated:

Auth
Command Injection
Cryptography
File Access
HTTP
Input validation
Insecure modules/libraries
Other
SQL Injection
SSL
XSS