Which of these attack vector vulnerabilities would you likely check if the guidelines for security configuration cover the OWASP top ten?
Options
- Injection attacks
- Authentication and Session management
- Sensitive data exposure
- All of the given options