| Section 01: Introduction | |||
| Introduction and motivation | 00:02:00 | ||
| Well-known Vulnerabilities Overview | 00:02:00 | ||
| Causes & Background | 00:09:00 | ||
| Secure Programming in general | 00:03:00 | ||
| Section 02: Well-known Vulnerabilities and Secure Programming | |||
| Code/Command Injection | 00:03:00 | ||
| (No)SQL Code Injection | 00:04:00 | ||
| Cross-Site Request Forgery (CSRF) | 00:05:00 | ||
| Cross-Site Scripting (XSS) | 00:05:00 | ||
| Open Redirection | 00:04:00 | ||
| File Inclusion / Directory Traversal | 00:05:00 | ||
| Clickjacking | 00:04:00 | ||
| Session-Hijacking | 00:07:00 | ||
| Information Disclosure | 00:03:00 | ||
| Authentification | 00:07:00 | ||
| Denial of Service | 00:05:00 | ||
| Middleware | 00:01:00 | ||
| Third-Party Software | 00:01:00 | ||
| Section 03: Conclusion and Summary | |||
| Conclusion and Summary | 00:04:00 | ||