The Developer's Vulnerability Manual
Vulnerability Manual
Table of Contents
Part 1: Python
1. Insecure Direct Object References (IDOR)
2. Insecure File Handling
Part 2: C
3. Buffer Overflow
4. Use After Free (UAF)
Part 3: Php
5. SQL Injection
6. Remote Code Execution (RCE)
Part 4: Java
7. Injection Attack
8. Insecure Deserialization
References
Vuln Manual
Book
Contents
Table of Contents
Vulnerability Manual
A manual for developers on how to deal with various vulnerabilities in the C, Python, and PHP programming languages.
Part 1: Python
Chapter 1.
Insecure Direct Object References (IDOR)
Learn what IDOR vulnerabilities are and how to prevent them.
Chapter 2.
Insecure File Handling
Learn how insecure file handling happens in Python and how to mitigate it.
Part 2: C
Chapter 3.
Buffer Overflow
Learn about the famous buffer overflow vulnerability and how to prevent them.
Chapter 4.
Use After Free (UAF)
Prevent UAF with Memory Management Best Practices
Part 3: Php
Chapter 5.
SQL Injection
Secure your PHP app - Prevent SQL injection with proper input validation.
Chapter 6.
Remote Code Execution (RCE)
Understand and prevent Remote Code Execution (RCE) vulnerabilities in PHP applications.
Part 4: Java
Chapter 7.
Injection Attack
Prevent Java injection attacks with robust input validation.
Chapter 8.
Insecure Deserialization
Harden your Java app's defenses against insecure deserialization by validating all received data.
References
Next: Part 1.
Python
Previous:
Vulnerability Manual