OWASP TOP TEN EVALUATION SHEET Application Name: Evaluator Name : INJECTION Methodology: Findings : BROKEN AUTHENTICATION/SESSION MANAGEMENT Methodology: Findings : CROSS-SITE SCRIPTING Methodology: Findings : INSECURE DIRECT OBJECT REFERENCES Methodology: Findings : SECURITY MISCONFIGURATION Methodology: Findings : SENSITIVE DATA EXPOSURE Methodology: Findings : MISSING FUNCTION LEVEL ACCESS CONTROL Methodology: Findings : CROSS-SITE REQUEST FORGERY Methodology: Findings : USING KNOWN VULNERABLE COMPONENTS Methodology: Findings : UNVALIDATED REDIRECTS AND FORWARDS Methodology: Findings :