Authentication Failures
Broken Access Control
Cryptographic Failures
Improper Logging
Injection
Insecure Design
Security Misconfiguration
Software Data Integrity
SSRF
Vulnerable Components