OWASP Top 10 D-2 Pick one common web application vulnerability from the “OWASP T

OWASP Top 10 D-2 Pick one common web application vulnerability from the “OWASP T

OWASP Top 10 D-2 Pick one common web application vulnerability from the “OWASP Top Ten Vulnerabilities” (Google the most current years list!). Write that include the following: The vulnerability you selected. A brief explanation of the vulnerability along with an example. How it is exploited. Ways to detect and prevent attacks on the selected vulnerability.