Tag#owaspA10: Insufficient logging and monitoring ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#logging-and-monitoring#owasp-top-10#owaspA9: Using Components with Known Vulnerabilities ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp-top-10#owaspA8: Insecure Deserialization ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#insecure-deserialization#owasp#owasp-top-10A7: Cross-Site Scripting (XSS) — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp#owasp-top-10#xss-attackA6: Security Misconfiguration ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp#owasp-top-10#security-misconfigurationA5: Broken Access Control ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp-top-10#owasp#broken-access-controlA4: XML External Entities (XXE) ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#xxe#owasp#owasp-top-10A3: Sensitive Data Exposure ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#sensitive-data-exposure#owasp#owasp-top-10A2: Broken Authentication ❗️ — Top 10 OWASP 20173 years agoIvan NovikovOpen in Source#blog#owasp#broken-authentication#owasp-top-10A1:Injection — Top 10 OWASP 2017 3 years agoIvan NovikovOpen in Source#blog#owasp#owasp-top-101