01-4-1--OWASP-Overview-(3-51-)
02-4-2--Broken-Access-Control-(8-24-)
03-4-3--Cryptographic-Failures-(10-45-).html
03-4-3--Cryptographic-Failures-(10-45-)
04-4-4--Injection---XSS-(20-24-)
05-4-5--Injection---SQLI-(16-34-).html
05-4-5--Injection---SQLI-(16-34-)
06-4-6--Injection---Command-Injection-(4-56-)
07-4-7--Insecure-Design-(22-57-).html
07-4-7--Insecure-Design-(22-57-)
08-4-8--Security-Misconfiguration-(3-07-)
09-4-9--Vulnerable-and-Outdated-Components-(8-22-)
10-4-10--Identification-and-Authentication-Failures-(8-15-)
11-4-11--Software-and-Data-Integrity-Failures-(3-39-)
12-4-12--Security-Logging-and-Monitoring-Failures-(2-33-)
13-4-13--Server-Side-Request-Forgery-(1-28-)
14-4-14--Extra-Practice-(1-41-)