Information Gathering
Insecure Software Defaults
Information Disclousure
Abnormal Behaviour
Insecure Data Transport
Inadequate Input Validation
Insecure Session Managment
Risky Feature
Generic Security Finding
Insecure Software Configuration
Insecure Data Storage
Insecure Authentication
Weak Access Controls