Python Lessons
Filters (1)
Server-side request forgery
Learn how to protect your code from server-side request forgery attacks by exploiting a vulnerable web app as part of this Snyk Learn tutorial.
XPath injection
Learn about XPath injections, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Logging vulnerabilities
Learn what a logging vulnerability is, including logging too much or logging too little, and how to protect your organization.
Code injection
Learn how to protect your applications against malicious code injection by exploiting a vulnerable web app as part of this Snyk Learn lesson.
No rate limiting
Learn about the issues that arise in an application that employs no rate limiting techniques, as well as how you can go about implementing those protections.
Vulnerable and outdated components
A vulnerable and outdated component is a software component that is no longer supported by the developer, making it susceptible to security vulnerabilities.
Insecure design
Learn about insecure design, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Insecure hash
Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization
Broken access control
Learn how broken access control exploits work with a step-by-step tutorial, as well as how to mitigate and defend against them with access control settings.
XML external entity injection
Learn how an XXE attack works, and how to mitigate and fix the XXE vulnerability with real-world examples from security experts.
Open redirect
Learn about the risks of exposing open redirects, how to exploit them and how to mitigate them.
Directory traversal
Learn how to protect your code from directory traversal in JavaScript by exploiting a vulnerable web server.
Cross-site scripting
Learn about XSS and how to protect your code from various cross-site scripting (XSS) attacks.
SQL injection
Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.
LDAP injection
Learn about LDAP injection, and how to mitigate and remediate the vulnerability with real-world examples from security experts.