NoSQL injection attack
Learn how NoSQL Injection attacks work, and compare them to the similar SQL injection attacks with examples and remediation information
No rate limiting
Learn about the issues that arise in an application that employs no rate limiting techniques, as well as how you can go about implementing those protections.
Vulnerable and outdated components
A vulnerable and outdated component is a software component that is no longer being supported by the developer, making it susceptible to security vulnerabilities.
Learn what a logging vulnerability is, including logging too much or logging too little, and how to protect your organization.
Learn about insecure design, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization
Learn what ReDos is, why you should be aware of it, and how you can prevent and remediate the vulnerability in your organization
Broken access control
Learn how broken access control exploits work with a step-by-step tutorial, as well as how to mitigate and defend against them with access control settings.
XML external entity injection
Learn how an XXE attack works, and how to mitigate and fix the XXE vulnerability with real-world examples from security experts.
Cross site request forgery
Learn how a cross site request forgery (CSRF) attack works, and how to detect and fix it with real-world examples from security experts.
Learn how DOM based XSS exploits work, and how to mitigate and remediate the vulnerability with step-by-step interactive tutorials from security experts.
Learn about the risks of exposing open redirects, how to exploit them and how to mitigate them.
Server-side request forgery
Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.