|  | 1 | A01: Broken Access Control - improper enforcement of access controls can allow attackers to gain unauthorized access to resources and perform actions they shouldn't be able to. | Threat | Medium |  | 
|  | 2 | A02: Cryptographic Failures - weak or improperly implemented cryptographic mechanisms can lead to unauthorized access and data breaches. | Threat | Medium |  | 
|  | 3 | A03: Injection - attackers can exploit vulnerabilities in input handling to inject malicious code, such as SQL, NoSQL, OS commands, or LDAP queries. | Threat | Medium |  | 
|  | 4 | A04: Insecure Design - applications lacking secure design principles can have inherent security weaknesses that attackers can exploit. | Threat | Major |  | 
|  | 5 | A05: Security Misconfiguration - improper configuration of security settings can leave applications vulnerable to attacks. This can lead to unauthorized access, data breaches, and exposure of sensitive information. | Threat | Critical |  | 
|  | 6 | A06: Vulnerable and Outdated Components - outdated or unpatched components, such as libraries, frameworks, and other software modules, can have known vulnerabilities that attackers can exploit. | Threat | Medium |  | 
|  | 7 | A07: Identification and Authentication Failures - weaknesses in identification and authentication mechanisms can allow attackers to compromise passwords, keys, or session tokens, leading to unauthorized access. | Threat | Medium |  | 
|  | 8 | A08: Software and Data Integrity Failures - vulnerabilities in software updates, critical data, and CI/CD pipelines can be exploited by attackers to introduce malicious code or compromise data integrity. | Threat | Low |  | 
|  | 9 | A09: Security Logging and Monitoring Failures - inadequate logging and monitoring can prevent the detection of security breaches and other malicious activities. | Threat | Medium |  | 
|  | 10 | A10: Server-Side Request Forgery (SSRF) - attackers can exploit SSRF vulnerabilities to make unauthorized requests from the server, potentially accessing internal systems, sensitive data, and services. | Threat | Medium |  |