- DocumentXSSuploaded byGlady Gladson
- DocumentXML EXTERNAL ENTITIESuploaded byGlady Gladson
- DocumentUSING COMPONENTS WITH KNOWN VULNERABILITIESuploaded byGlady Gladson
- DocumentSQL INJECTIONuploaded byGlady Gladson
- DocumentSENSITIVE DATA EXPOSUREuploaded byGlady Gladson
- DocumentINSUFFICIENT LOGGING AND MONITORINGuploaded byGlady Gladson
- DocumentSECURITY MISCONFIGURATIONuploaded byGlady Gladson
- DocumentBROKEN ACCESS CONTROLuploaded byGlady Gladson
- DocumentINSECURE DESERIALIZATIONuploaded byGlady Gladson
- DocumentBROKEN AUTHENTICATIONuploaded byGlady Gladson