Despite being one of the world's most popular programming languages, Java has a reputation for being insecure. From poor documentation to insecure defaults, it can get tricky for a developer to find and fix security bugs.
The Java Security Playground is here to help. Through a series of hands-on labs, we help you build secure coding practices to combat the most critical vulnerabilities in Java applications.
From SQL Injection and Cross-Site Scripting (XSS) to XML External Entity (XXE), SSRF, and Log4Shell, this is a comprehensive walkthrough of key security weak points you need to focus on.
Insecure Deserialization
Casbin RBAC
Session Fixation
SQL Injection
Reflected XSS
Stored XSS
XXE
SSRF
Log4Shell