Start Here

A hands-on training guide for security teams and developers to learn application security through practical code examples.

What This Guide Covers

This training material teaches 26 common web application vulnerabilities using real-world code examples. Each vulnerability is presented through a side-by-side comparison of vulnerable and secure code, making it easy to understand both the problem and the solution.

Learning Approach

See the Vulnerability β†’ Every guide starts with a vulnerable code example that contains a real security flaw

Understand the Exploit β†’ Learn how attackers exploit the vulnerability to compromise applications or access sensitive data

Apply the Fix β†’ Step-by-step instructions show how to remediate the vulnerability with secure coding practices

Detect It Early β†’ Each vulnerability includes a Semgreparrow-up-right rule template to integrate into your SAST scanning and CI/CD pipelines

Who This Is For

  • Security teams training developers on secure coding practices

  • Application security engineers learning to identify and remediate vulnerabilities

  • Development teams improving their security knowledge through practical examples

  • Security champions teaching peers about common web security issues

What's Included

26 vulnerabilities organized into 5 categories:

  • Injection Vulnerabilities (6) - SQL, SSTI, XPath, XXE, Request Smuggling, Deserialization

  • Input-based Vulnerabilities (3) - XSS, CSP Misconfiguration, HTTP Parameter Pollution

  • Origin-related Vulnerabilities (3) - CSRF, SSRF, CORS Misconfiguration

  • Access-related Vulnerabilities (6) - IDOR, Auth Code Interception, Session Hijacking, TLS Issues, JWT Vulnerabilities

  • Logic & Timing Vulnerabilities (3) - Business Logic Flaws, Type Juggling, Timing Attacks

Note

This guide focuses on practical code-level vulnerabilities. It is not exhaustive but covers the most common web application security issues encountered in modern development.

Last updated