Rank | OWASP Top 10 | % Correct |
---|---|---|
5 | Broken {Access Control} | 100%
|
2 | Broken {Authentication} | 100%
|
7 | {Cross-Site} Scripting | 100%
|
9 | Using Components with {Known Vulnerabilities} | 100%
|
1 | Injection | 88%
|
3 | {Sensitive} Data Exposure | 88%
|
10 | Insufficient {Logging & Monitoring} | 75%
|
6 | Security {Misconfiguration} | 75%
|
8 | Insecure {Deserialization} | 63%
|
4 | XML {External Entities} | 38%
|
Copyright H Brothers Inc, 2008–2024
Contact Us | Go To Top | View Desktop Site