JavaScript Lessons

javascript NoSQL injection attack
javascriptNEW

NoSQL injection attack

Learn how NoSQL Injection attacks work, and compare them to the similar SQL injection attacks with examples and remediation information
javascript No rate limiting
javascript

No rate limiting

Learn about the issues that arise in an application that employs no rate limiting techniques, as well as how you can go about implementing those protections.
javascript Vulnerable and outdated components
javascript

Vulnerable and outdated components

A vulnerable and outdated component is a software component that is no longer being supported by the developer, making it susceptible to security vulnerabilities.
javascript Logging Vulnerabilities
javascript

Logging Vulnerabilities

Learn what a logging vulnerability is, including logging too much or logging too little, and how to protect your organization.
javascript Insecure design
javascript

Insecure design

Learn about insecure design, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
javascript Insecure hash
javascript

Insecure hash

Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization
javascript ReDoS
javascript

ReDoS

Learn what ReDos is, why you should be aware of it, and how you can prevent and remediate the vulnerability in your organization
javascript Broken access control
javascript

Broken access control

Learn how broken access control exploits work with a step-by-step tutorial, as well as how to mitigate and defend against them with access control settings.
javascript XML external entity injection
javascript

XML external entity injection

Learn how an XXE attack works, and how to mitigate and fix the XXE vulnerability with real-world examples from security experts.
javascript Cross site request forgery
javascript

Cross site request forgery

Learn how a cross site request forgery (CSRF) attack works, and how to detect and fix it with real-world examples from security experts.
javascript DOM XSS
javascript

DOM XSS

Learn how DOM based XSS exploits work, and how to mitigate and remediate the vulnerability with step-by-step interactive tutorials from security experts.
javascript Open redirect
javascript

Open redirect

Learn about the risks of exposing open redirects, how to exploit them and how to mitigate them.
javascript Server-side request forgery
javascript

Server-side request forgery

Learn how to protect your code from server-side request forgery attacks in JavaScript by exploiting a vulnerable web app as part of this Snyk Learn tutorial.
javascript Code injection
javascript

Code injection

Learn how to protect your applications against malicious code injection in JavaScript by exploiting a vulnerable web app as part of this Snyk Learn lesson.
javascript Directory traversal
javascript

Directory traversal

Learn how to protect your code from directory traversal in JavaScript by exploiting a vulnerable web server.
javascript Cross-site scripting
javascript

Cross-site scripting

Learn how to protect your JavaScript code from various forms of cross-site scripting (XSS) attacks.
javascript Prototype pollution
javascript

Prototype pollution

Learn what JavaScript prototype pollution is and how to prevent it.
javascript SQL injection
javascript

SQL injection

Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.