Table of Contents
- Secure Coding Fundamentals
- Injection Flaws
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting
- Insecure Deserialization
- Using components with known vulnerabilities
- Insufficient Logging and Monitoring
- Miscellaneous Vulnerabilities
- Best Practices

