Show transcription
In the seminar we talked about the different vulnerabilities in the OWASP Top 10, as well as explaining some of them in more depth, with examples and ways to prevent and mitigate them, focusing on the developer's point of view.
Finally, we show a practical example of how vulnerabilities such as SQL injection or XSS could be exploited using the OWASP Juice Shop vulnerable web application as a target.