Journey contents
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities
- Broken Access Control
- Security Misconfiguration
- Cross-site scripting
- Insecure Deserialization
- Using Components with Known vulnerabilities
- Insufficient Logging & Monitoring
- Consolidation Exam