Last but not least. These set challenges consist of 8: Insecure deserialization, 9: Using Components with Known Vulnerabilities, 10: Insufficient Logging and Monitoring
8: Insecure deserialization,
9: Using Components with Known Vulnerabilities,
10: Insufficient Logging and Monitoring