Vulnerable and outdated components
A vulnerable and outdated component is a software component that is no longer supported by the developer, making it susceptible to security vulnerabilities.
No rate limiting
Learn about the issues that arise in an application that employs no rate limiting techniques, as well as how you can go about implementing those protections.
Server-side request forgery
Learn what a logging vulnerability is, including logging too much or logging too little, and how to protect your organization.
XML external entity injection
Learn how an XXE attack works, and how to mitigate and fix the XXE vulnerability with real-world examples from security experts.
Broken access control
Learn how broken access control exploits work with a step-by-step tutorial, as well as how to mitigate and defend against them with access control settings.
Learn about LDAP injection, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Learn about insecure design, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization
Learn about the risks of exposing open redirects, how to exploit them and how to mitigate them.
Learn how to protect your code from directory traversal in Python by exploiting a vulnerable web server.
Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.
Learn how to protect your Python code from various forms of cross-site scripting (XSS) attacks.