Modul 1 | Injection Attacks |
Einheit 1 | 1/10 - Injection Attacks |
Modul 2 | Broken Authentication |
Einheit 1 | 2/10 - Broken Authentication |
Modul 3 | Sensitive Data Exposure |
Einheit 1 | 3/10 - Sensitive Data Exposure |
Modul 4 | ML External Entities |
Einheit 1 | 4/10 - XML External Entities |
Modul 5 | Broken Access Control |
Einheit 1 | 5/10 - Broken Access Control |
Modul 6 | Security Misconfiguration |
Einheit 1 | 6/10 - Security Misconfiguration |
Modul 7 | Cross-Site Scripting (XSS) |
Einheit 1 | 7/10 - Cross-Site Scripting (XSS) |
Modul 8 | Insecure Deserialization |
Einheit 1 | 8/10 - Insecure Deserialization |
Modul 9 | Using Components With Known Vulnerabilities |
Einheit 1 | 9/10 - Using Components With Known Vulnerabilities |
Modul 10 | Insufficient Logging and Monitoring |
Einheit 1 | 10/10 - Insufficient Logging and Monitoring |