Feb 13, 20219 min readHow to Avoid SQL Injection VulnerabilitiesPrimary Defenses: Use of Prepared Statements (with Parameterized Queries) Use of Stored Procedures Whitelist Input Validation Escaping All U
Feb 13, 20212 min readInjectionSQL injection errors occur, when data enters a program from an untrusted source, where data used to dynamically construct a SQL query
Feb 11, 20215 min readSecurity Vulnerabilities in Modern Web ApplicationsRestrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unau