|
1 |
A01: Broken Access Control - improper enforcement of access controls can allow attackers to gain unauthorized access to resources and perform actions they shouldn't be able to. |
Threat |
Medium |
|
|
2 |
A02: Cryptographic Failures - weak or improperly implemented cryptographic mechanisms can lead to unauthorized access and data breaches. |
Threat |
Medium |
|
|
3 |
A03: Injection - attackers can exploit vulnerabilities in input handling to inject malicious code, such as SQL, NoSQL, OS commands, or LDAP queries. |
Threat |
Medium |
|
|
4 |
A04: Insecure Design - applications lacking secure design principles can have inherent security weaknesses that attackers can exploit. |
Threat |
Major |
|
|
5 |
A05: Security Misconfiguration - improper configuration of security settings can leave applications vulnerable to attacks. This can lead to unauthorized access, data breaches, and exposure of sensitive information. |
Threat |
Critical |
|
|
6 |
A06: Vulnerable and Outdated Components - outdated or unpatched components, such as libraries, frameworks, and other software modules, can have known vulnerabilities that attackers can exploit. |
Threat |
Medium |
|
|
7 |
A07: Identification and Authentication Failures - weaknesses in identification and authentication mechanisms can allow attackers to compromise passwords, keys, or session tokens, leading to unauthorized access. |
Threat |
Medium |
|
|
8 |
A08: Software and Data Integrity Failures - vulnerabilities in software updates, critical data, and CI/CD pipelines can be exploited by attackers to introduce malicious code or compromise data integrity. |
Threat |
Low |
|
|
9 |
A09: Security Logging and Monitoring Failures - inadequate logging and monitoring can prevent the detection of security breaches and other malicious activities. |
Threat |
Medium |
|
|
10 |
A10: Server-Side Request Forgery (SSRF) - attackers can exploit SSRF vulnerabilities to make unauthorized requests from the server, potentially accessing internal systems, sensitive data, and services. |
Threat |
Medium |
|