OWASP Code Review Guide Table of Contents

Methodology

 * 1) Introduction
 * 2) Steps and Roles
 * 3) Code Review Processes

Design review

 * 1) Designing for security

Examples by Vulnerability

 * 1) Buffer Overruns and Overflows
 * 2) OS Injection
 * 3) SQL Injection
 * 4) Data Validation
 * 5) Error Handling
 * 6) The Secure Code Environment
 * 7) Transaction Analysis
 * 8) Authorization
 * 9) Authentication
 * 10) Session Integrity
 * 11) Cross Site Request Forgery
 * 12) Cryptography

Java

 * 1) Inner classes
 * 2) Class comparison
 * 3) Cloneable classes
 * 4) Serializable classes
 * 5) Package scope and encapsulation
 * 6) Mutable objects
 * 7) Private methods & circumvention