Vulnerabilities
Table of Contents
OWASP
TODO add notes here.
- https://github.blog/2021-12-06-write-more-secure-code-owasp-top-10-proactive-controls/
- https://github.blog/2022-02-16-encoding-escaping-untrusted-data-prevent-injection-attacks/
How do we identify them?
By looking at the checkmarx and other scan reports for the application.