click here for source
1.Unvalidated Input
2.Broken access Control
3.Broken account/session management
4.Cross-site scripting (XSS) flaws
5.Buffer Overflows
6.Injection flaws
7.Improper error handling
8.Insecure storage
9.Denial-of-service
10.Insecure configuration management
No comments:
Post a Comment