Case Study

A Developer’s Guide to the OWASP Top 10 2017

A Developer’s Guide to the OWASP Top 10 2017

A Developer’s Guide to the OWASP Top 10 2017 White PaperTable of Contents Secure Coding is No Longer an Option. It’s a Necessity. ..........................1 A1: Injection ................................................................. 2 A2: Broken Authentication .................................................... 3 A3: Sensitive Data Exposure .................................................. 4 A4: XML External Entities (XXE) ................................................ 5 A5: Broken Access Control ................................................... 7 A6: Security Misconfiguration ................................................. 8 A7: Cross-Site Scripting (XSS) ................................................. 9 A8: Insecure Deserialization ........................................

Join for free to read