Problem
Describe, in your own words, OWASP Top Ten Vulnerabilities. Make sure to cover the following for each vulnerability:
o Vulnerability Name
o How the Vulnerability Exists
o How the Vulnerability Exploit Works
o Types of Applications the Vulnerability Impacts
o Years in Existence.
The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.