The following is an extensive library of security solutions, articles and guides that are meant to be helpful and informative resources on a range of Web vulnerability types, including, but not limited to, Cross-Site Scripting, SQL injection, CSRF injection and insufficient transport layer weaknesses. Web application vulnerabilities are some of the most common flaws leading to modern data breaches. You can get quick insight into what the most prevalent coding vulnerabilities are using our interactive data explorer, you can also filter by programming language and industry!
Cross-Site Request Forgery Cross-Site Request Forgery (CSRF) is a malicious attack that tricks the user’s web browser to perform undesired actions so that they appear as if an authorized user is performing those actions. Learn More
Failure to Restrict URL Access is one of the common vulnerabilities listed on the Open Web Application Security Project’s (OWASP) Top 10. The OWASP Top 10 details the most critical vulnerabilities in web applications. Learn More
LDAP Injection LDAP injection is the technique of exploiting web applications that use client-supplied data in LDAP statements without first stripping potentially harmful characters from the request. Learn More
Malicious Code Analysis tools are designed to uncover any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Learn More
SQL Injection SQL injection is a type of web application security vulnerability in which an attacker is able to submit a database SQL command, which is executed by a web application, exposing the back-end database. Learn More