JavaScript Lessons

javascript Memory leaks
javascript

Memory leaks

Learn about memory leaks, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
javascript Mass assignment
javascript

Mass assignment

Learn about mass assignment and the risks of user-provided data. Learn to mitigate and remediate the vulnerability with real-world examples from security experts.
javascript Insecure temporary file
javascript

Insecure temporary file

Learn about the issues that emerge when creating an insecure temporary file as well as how to mitigate this vulnerability.
javascript Cleartext storage of sensitive information in a cookie
javascript

Cleartext storage of sensitive information in a cookie

Learn about the issues that arise when storing cleartext or plaintext sensitive information in a cookie as well as solutions to this vulnerability.
javascript XPath injection
javascript

XPath injection

Learn about XPath injections, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
javascript Weak password recovery
javascript

Weak password recovery

A user forgot their password! How can you create a secure password recovery? Learn about weak password recoveries, see it in action, and learn the mitigation techniques.
javascript Insecure Randomness
javascript

Insecure Randomness

Learn all about randomness and the importance of having truly random numbers. We'll also look at why insecure randomness is a security concern and how to avoid it.
javascript NoSQL injection attack
javascript

NoSQL injection attack

Learn how NoSQL Injection attacks work, and compare them to the similar SQL injection attacks with examples and remediation information
javascript No rate limiting
javascript

No rate limiting

Learn about the issues that arise in an application that employs no rate limiting techniques, as well as how you can go about implementing those protections.
javascript Vulnerable and outdated components
javascript

Vulnerable and outdated components

A vulnerable and outdated component is a software component that is no longer supported by the developer, making it susceptible to security vulnerabilities.
javascript Logging vulnerabilities
javascript

Logging vulnerabilities

Learn what a logging vulnerability is, including logging too much or logging too little, and how to protect your organization.
javascript Insecure design
javascript

Insecure design

Learn about insecure design, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
javascript Insecure hash
javascript

Insecure hash

Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization
javascript ReDoS
javascript

ReDoS

Learn what ReDos is, why you should be aware of it, and how you can prevent and remediate the vulnerability in your organization
javascript Broken access control
javascript

Broken access control

Learn how broken access control exploits work with a step-by-step tutorial, as well as how to mitigate and defend against them with access control settings.
javascript XML external entity injection
javascript

XML external entity injection

Learn how an XXE attack works, and how to mitigate and fix the XXE vulnerability with real-world examples from security experts.
javascript Cross site request forgery
javascript

Cross site request forgery

Learn how a cross site request forgery (CSRF) attack works, and how to detect and fix it with real-world examples from security experts.
javascript DOM XSS
javascript

DOM XSS

Learn how DOM based XSS exploits work, and how to mitigate and remediate the vulnerability with step-by-step interactive tutorials from security experts.
javascript Open redirect
javascript

Open redirect

Learn about the risks of exposing open redirects, how to exploit them and how to mitigate them.
javascript Server-side request forgery
javascript

Server-side request forgery

Learn how to protect your code from server-side request forgery attacks in JavaScript by exploiting a vulnerable web app as part of this Snyk Learn tutorial.
javascript Code injection
javascript

Code injection

Learn how to protect your applications against malicious code injection in JavaScript by exploiting a vulnerable web app as part of this Snyk Learn lesson.
javascript Directory traversal
javascript

Directory traversal

Learn how to protect your code from directory traversal in JavaScript by exploiting a vulnerable web server.
javascript Cross-site scripting
javascript

Cross-site scripting

Learn how to protect your JavaScript code from various forms of cross-site scripting (XSS) attacks.
javascript Prototype pollution
javascript

Prototype pollution

Learn what JavaScript prototype pollution is and how to prevent it.
javascript SQL injection
javascript

SQL injection

Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.