Exploits

Recall that our sample application container various vulnerabilities. We are going to run through a few examples of a select group of these to demonstrate the importance of identifying and resolving these.

Let's explore a few examples of how these vulnerabilities can be exploited by potential bad actors.