👨🌾2017🎁Introduction🎁A1.2017 Injection🎁A2.2017 Broken authentication🧱A3.2017 Sensitive data exposure🎁A4.2017 XML eXternal Entities🎁A5.2017 Broken Access Control🧱A6.2017 Security Misconfiguration🧱A7.2017 XSS🎁A8.2017 Insecure deserilization🎁A10. 2017 Insufficient Logging & Monitoring🎁A9.2017 Using Components with Known Vulnerabilities🧱A1. Injection - Rebuilt🧱A8 Insecure Deserilialization - Rebuilt🧱A10: Insufficient logging and monitoring