Introduction

A1.2017 Injection

A2.2017 Broken authentication

A3.2017 Sensitive data exposure

A4.2017 XML eXternal Entities

A5.2017 Broken Access Control

A6.2017 Security Misconfiguration

A7.2017 XSS

A8.2017 Insecure deserilization

A10. 2017 Insufficient Logging & Monitoring

A9.2017 Using Components with Known Vulnerabilities

A1. Injection - Rebuilt

A8 Insecure Deserilialization - Rebuilt

A10: Insufficient logging and monitoring