-
-
2/10 - Broken Authentication
-
3/10 - Sensitive Data Exposure
-
4/10 - XML External Entities
-
5/10 - Broken Access Control
-
6/10 - Security Misconfiguration
-
7/10 - Cross-Site Scripting (XSS)
-
8/10 - Insecure Deserialization
-
9/10 - Using Components With Known Vulnerabilities
-
10/10 - Insufficient Logging and Monitoring