1. 2021. OWASP Top 10 Web Application Vulnerabilities. https://owasp.org/wwwproject-top-ten/ . Accessed : April 2022 . 2021. OWASP Top 10 Web Application Vulnerabilities. https://owasp.org/wwwproject-top-ten/. Accessed: April 2022.
2. 2022. OWASP Zed Attack Proxy (ZAP). https://www.zaproxy.org/ . Accessed : April 2022 . 2022. OWASP Zed Attack Proxy (ZAP). https://www.zaproxy.org/. Accessed: April 2022.
3. 2022. Semgrep. https://semgrep.dev/ . Accessed : April 2022 . 2022. Semgrep. https://semgrep.dev/. Accessed: April 2022.
4. 2022. W3Schools: HTML DOM innerHTML Property. https://www.w3schools. com/jsref/prop_html_innerhtml.asp . Accessed : April 2022 . 2022. W3Schools: HTML DOM innerHTML Property. https://www.w3schools. com/jsref/prop_html_innerhtml.asp. Accessed: April 2022.
5. How Secure are our Computer Systems Courses?