The CWE Top 25 list is divided into three categories based on the severity, frequency, and likelihood of exploitation of each weakness: the top nine critical weaknesses, the next eight high risk weaknesses, and the remaining eight moderate risk weaknesses. Each weakness is scored using various factors such as prevalence, impact, remediation cost, and exploitability. The top nine critical weaknesses are Improper Restriction of Operations within the Bounds of a Memory Buffer, Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’), Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’), Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’), Missing Authentication for Critical Function, Missing Authorization, Use of Hard-coded Credentials, Deserialization of Untrusted Data, and Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’). The next eight high risk weaknesses are Uncontrolled Resource Consumption, Use of a Broken or Risky Cryptographic Algorithm, Use of Insufficiently Random Values, Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP File Inclusion’), Improper Validation of Array Index, Improper Check for Unusual or Exceptional Conditions, Incorrect Calculation of Buffer Size, and Use After Free. Lastly, the remaining eight moderate risk weaknesses include Integer Overflow or Wraparound, Improper Neutralization of Script-Related HTML Tags in a Web Page (‘Basic XSS’), Improper Restriction of Excessive Authentication Attempts, URL Redirection to Untrusted Site (‘Open Redirect’), Embedded Malicious Code, Improper Handling of Syntactically Invalid Structure, Information Exposure Through an Error Message, and Out-of-bounds Read. Reporting and documenting these weaknesses can help inform stakeholders and provide valuable insights for improving cloud security posture.