• 2/10 - Broken Authentication
    • 3/10 - Sensitive Data Exposure
    • 4/10 - XML External Entities
    • 5/10 - Broken Access Control
    • 6/10 - Security Misconfiguration
    • 7/10 - Cross-Site Scripting (XSS)
    • 8/10 - Insecure Deserialization
    • 9/10 - Using Components With Known Vulnerabilities
    • 10/10 - Insufficient Logging and Monitoring