• Front-end Top 5
    • OWASP Top 10 for API
    • OWASP Top 10 for Web
    • AWS Top 10
    • Cloud DevOps and Other Courses
    • OWASP Top 10 for iOS
    • Docker Compose Top 10
    • OWASP Top 10 for Kubernetes
    • Docker CLI Top 10
  • Try SCORM
  • Plans
  • Courses
  • Blog
  • About
  • Plans & Pricing
  • About Company
  • Try SCORM
  • Get Your Free Trial
  • Book a Demo
  • Blog
  • Front-end Top 5
  • OWASP Top 10 for API
  • OWASP Top 10 for Web
  • AWS Top 10
  • Cloud DevOps and Other Courses
  • OWASP Top 10 for iOS
  • Docker Compose Top 10
  • OWASP Top 10 for Kubernetes
  • Docker CLI Top 10
  • DEMO VIDEO

Kontra OWASP Top 10 for Web

KONTRA's developer security training of OWASP Top 10 is inspired by real-world vulnerabilities and case studies, we have created a series of interactive application security training modules to help developers understand, identify and mitigate security vulnerabilities in their applications.

  • Capital One SSRF

    Capital One SSRF
  • Clickjacking

    Clickjacking
  • Command Injection

    Command Injection
  • Components with Known Vulnerabilities

    Components with Known Vulnerabilities
  • Cross Site Request Forgery

    Cross Site Request Forgery
  • Directory Traversal

    Directory Traversal
  • DOM XSS

    DOM XSS
  • Forced Browsing

    Forced Browsing
  • Header Injection

    Header Injection
  • Horizontal Privilege Escalation

    Horizontal Privilege Escalation
  • Insecure URL Redirect

    Insecure URL Redirect
  • Leftover Debug Code

    Leftover Debug Code
  • Log4j 2 CVE-2021-44228

    NEW
    Log4j 2 CVE-2021-44228
  • Permission Issues

    Permission Issues
  • PII data in URL

    PII data in URL
  • Reflected XSS

    Reflected XSS
  • Ruby rest-client 1.6.13 backdoor vulnerability

    Ruby rest-client 1.6.13  backdoor vulnerability
  • Session Fixation

    Session Fixation
  • SQL Injection

    SQL Injection
  • Stored Cross Site Scripting

    Stored Cross Site Scripting
  • Test Pseudocode

    Test Pseudocode
  • TikTok Cross Site Scripting Vulnerability

    TikTok Cross Site Scripting Vulnerability
  • Token Exposure in URL

    Token Exposure in URL
  • User Enumeration

    User Enumeration
  • Vertical Privilege Escalation

    Vertical Privilege Escalation
  • Weak Randomness

    Weak Randomness
  • XML Injection

    XML Injection

JavaScript

  • test apps 2

    test apps 2
Kontra Logo

MENU

  • Kontra
  • About
  • Blog
  • Book a Demo
  • Privacy Policy
  • Support

Security Compass Technologies Ltd.

325 Front St. West,
Suite 103,
Toronto, ON,
M5V 2Y1, Canada
contact@securitycompass.com

Copyright © 2025 Security Compass Technologies Ltd.
Embed Exercise

Use the following code snippet to embed the exercise card on your web page, blog or wiki

Demo Video
Kontra demo video
Get Your Free Trial
Thank you for your interest in
Kontra Application Security by Security Compass!
A sales representative will be in touch soon
to arrange your free trial.

Access our Free OWASP Top 10 for Web
Enter your information below to join our referral
program and gain FREE access for 14 days
Follow the steps below to get FREE access to our OWASP top 10 for Web course for 14 days
  1. Simply copy the LinkedIn message below
  2. Post the message on your LinkedIn profile
  3. We will contact you as soon as possible on LinkedIn and send you an invite to access our OWASP Top 10 for Web course
IMPORTANT!
Make sure you confirm the tag @ThriveDX Enterprise after pasting the text below in your LinkedIn to avoid delays in getting access to your account.
instruction
Ready to share?
Take me to linkedin now >
Thank you for sharing!

We use cookies to ensure you get the best experience on our website. Accept
Read more