Summary Cover Introduction Introduction Setup Solution A1 Injection A2 Broken Authentication A3 Sensitive Data Exposure A4 XML External Entities A5 Broken Access Control A6 Security Misconfiguration A7 Cross-site Scripting A8 Insecure Deserialization A9 Using Components with Known Vulnerability A10 Insufficient Logging and Monitoring Top 10 2013 A8:2013 Cross-site Request Forgery A10:2013 Unvalidated Redirects and Forwards About Appsecco