Course
In this section, we delve into code execution vulnerabilities originating from improper filtering and escaping of user-controlled data. By understanding how to inject code into an application, you can identify and exploit these vulnerabilities ethically.
Skills covered
Injection
Operating System
CWE-20, CWE-95
Included with PRO
Full course content
2 videos
Common mistakes
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.