Learn about XPath injections, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization
XML external entity injection
Learn how an XXE attack works, and how to mitigate and fix the XXE vulnerability with real-world examples from security experts.
Learn about the risks of exposing open redirects, how to exploit them and how to mitigate them.
Learn about XSS and how to protect your code from various cross-site scripting (XSS) attacks.
Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.