Slide 6
Slide 6 text
OWASP TOP 10
Injection Broken Authentication Sensitive Data Exposure XML External Entities
Broken Access Control
Security
Misconfiguration
Cross-Site Scripting Insecure Deserialization
Using Component with
Known Vulnerabilities
Insufficient Logging
and Monitoring