Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization
Learn how to protect your applications against malicious code injection in Java by exploiting a vulnerable web app as part of this Snyk Learn lesson.
Learn what Spring4Shell is, why you should be aware of it, and how you can prevent and remediate the vulnerability in your organization.
Learn about the risks of exposing open redirects, how to exploit them and how to mitigate them.
Learn how an insecure deserialization attack works, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Learn how to protect your Log4j instances against malicious remote code execution (RCE) in Java by exploiting a vulnerable application as part of this Snyk Learn lesson.
Learn how to protect your Java code from various forms of cross-site scripting (XSS) attacks.
Learn how to protect your code from directory traversal in Java by exploiting a vulnerable web server.
Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.