Code Review
Purpose
1. SQL Injection
Vulnerable Code (Python)
def get_user_data(username):
query = "SELECT * FROM users WHERE username = '" + username + "'"
cursor.execute(query)
return cursor.fetchone()2. Cross-Site Scripting (XSS)
Vulnerable Code (JavaScript/Node.js)
3. Command Injection
Vulnerable Code (Python)
4. Path Traversal
Vulnerable Code (Java)
5. Insecure Authentication
Vulnerable Code (PHP)
6. Insecure Cryptography
Vulnerable Code (Python)
7. Insecure Deserialization
Vulnerable Code (Java)
8. XML External Entity (XXE)
Vulnerable Code (Java)
9. Insecure Random Number Generation
Vulnerable Code (Java)
10. Hardcoded Secrets
Vulnerable Code (Python)
11. Missing Access Control
Vulnerable Code (Node.js/Express)
12. Race Condition (TOCTOU)
Vulnerable Code (Python)
13. Buffer Overflow (C)
Vulnerable Code (C)
14. Missing Input Validation
Vulnerable Code (JavaScript)
15. Insecure Direct Object Reference (IDOR)
Vulnerable Code (Python/Flask)
16. Cross-Site Request Forgery (CSRF)
Vulnerable Code (PHP)
17. Insecure File Upload
Vulnerable Code (PHP)
18. Information Disclosure
Vulnerable Code (Python/Django)
19. Server-Side Request Forgery (SSRF)
Vulnerable Code (Python)
20. Weak Password Policy
Vulnerable Code (JavaScript)
Review Checklist
Additional Resources
Last updated