Completed
- Exploiting a Vulnerability
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exploiting AI-Generated Code Vulnerabilities and Their Solutions
Automatically move to the next video in the Classroom when playback concludes
- 1 - Intro
- 2 - Getting Acquainted with the Application
- 3 - Exploiting a Vulnerability
- 4 - Further Exploiting - Triggering an Alert Box
- 5 - What's the Big Deal?
- 6 - How an Attacker can Locate your Sensitive Data
- 7 - Fixing the Vulnerability with Snyk
- 8 - Vulnerability 2
- 9 - How a NoSQL Injection Attack Works
- 10 - Passing in a Note ID
- 11 - Outro