Learn about LDAP injection, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Learn about insecure design, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization
What is code injection? | Tutorial & examples
Learn about the risks of exposing open redirects, how to exploit them and how to mitigate them.
Learn how to protect your code from directory traversal in Python by exploiting a vulnerable web server.
Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.
Learn how to protect your Python code from various forms of cross-site scripting (XSS) attacks.