All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
nordicapis.com
5 Common API Vulnerabilities (and How to Fix Them) | Nordic APIs |
5 common API security flaws include DDoS, code injections, RBAC escalation, No ABAC validation, and business logic flaws. Learn how to recognize and mitigate them.
Aug 27, 2019
Related Products
API Example REST API Vulnerability Live
Ai Vulnerability PNG
Autocomplete Enabled Vulnerability
#OWASP Web Security Testing Guide
Master OWASP: Comprehensive Web Application Security Guide.
git.ir
Aug 27, 2024
Secure Your Web Application With OWASP
openclassrooms.com
Jan 23, 2025
Top videos
1:42
What Is BOLA? | Broken Object Level Authorization Explained in 60 Seconds | API Security Risks
YouTube
Radware
756 views
8 months ago
16:52
API1 - Broken Object Level Authorization | IDOR | crAPI
YouTube
The Cyber Expert
16K views
Apr 6, 2023
38:18
Understanding the #1 OWASP API vulnerability, Broken Object Level Authorization #cybersecurity.
YouTube
APIsec University
425 views
4 months ago
OWASP ZAP Tutorial
5:30
Hands-On Web Penetration Testing with Kali Linux: OWASP-ZAP|packtpub.com
YouTube
Packt
10.2K views
Oct 8, 2018
8:15
How to Use OWASP ZAP with WebGoat for Web Security Testing
YouTube
TechTales
1.9K views
Jan 17, 2025
58:47
Complete Zap Tutorial: How to Use OWASP ZAP for Web Application Security Testing
YouTube
Sonal
21.7K views
Jul 24, 2024
1:42
What Is BOLA? | Broken Object Level Authorization Explained in 6
…
756 views
8 months ago
YouTube
Radware
16:52
API1 - Broken Object Level Authorization | IDOR | crAPI
16K views
Apr 6, 2023
YouTube
The Cyber Expert
38:18
Understanding the #1 OWASP API vulnerability, Broken Object Level
…
425 views
4 months ago
YouTube
APIsec University
1:49
Top API risks and how to mitigate them | TechTarget
Jan 6, 2020
techtarget.com
4:39:29
Explaining API Vulnerabilities & Penetration Testing - By Dr. Ayo A
…
93 views
3 months ago
YouTube
it-bs media
0:12
API Security Best Practices: 1. Authentication and Authorization:
…
34.1K views
3 months ago
Facebook
Cyber security and ethical analysis
0:10
API vulnerability scanner interface showing security test results.
3 weeks ago
Adobe
ABDULELLAH
Qualys API Best Practices: Host List API | Qualys
Apr 14, 2021
qualys.com
2:15
⚠️ Broken Object Level Authorization (BOLA) in APIs | Ex
…
1 views
7 months ago
YouTube
HackSudo
Qualys API Best Practices: Host List Detection API | Qualys
Jul 9, 2021
qualys.com
3:11
Getting Started #7: Analyzing Discovered Vulnerabilities
174 views
Jan 2, 2025
YouTube
APIsec University
1:46
Exploiting a Critical API Authentication Vulnerability in vex
…
229 views
3 weeks ago
YouTube
Polymorphic
11:43
Top 10 OWASP Vulnerabilities for API Security Explained! - API Cyb
…
143.3K views
Feb 18, 2022
YouTube
Brenton House
9:33
Testing REST APIs for vulnerabilities
15.3K views
Jan 21, 2022
YouTube
MrTurvey
5:13
API Penetration Test | Broken Authentication | 06
5.9K views
Jun 7, 2021
YouTube
CyberSecurityTV
5:35
Test for BOLA Vulnerabilities with the free APIsec Scanner
555 views
11 months ago
YouTube
APIsec University
0:05
37K views · 199 reactions | How do we design secure and safe APIs?...
8.2K views
3 weeks ago
Facebook
Networks Professionals
6:29
API Manipulation and Injection Attacks | Build a More Secure API
…
3.1K views
Aug 11, 2022
YouTube
Akamai Developer
2:01
NEW API Vulnerability Scanner on Pentest-Tools.com
6.6K views
Aug 24, 2023
YouTube
Pentest-Tools
2:18
Account Reset link Bypass via Burpsuite – Understanding Vulner
…
2.4K views
Feb 27, 2025
YouTube
4get security
45:43
Inside the biggest API breaches (and how to stop the next one)
3 months ago
YouTube
Astra Security
10:13
Finding Vulnerabilities and Hacking With OWASP ZAP
15.9K views
Apr 20, 2022
YouTube
SecNet Lab
21:47
API Security Testing with Postman: Best Practices and Techniques
29.5K views
Feb 12, 2021
YouTube
Postman
7:35
Essential API Security Defenses: Protect Your APIs from Common
…
26 views
1 month ago
YouTube
elatify
10:15
How to scan for vulnerabilities(CVE) using nmap
9.2K views
Dec 6, 2021
YouTube
Cyber Nash
11:55
API PENETRATION TESTING: THE MASS ASSIGNMENT VULNERABI
…
4.7K views
Jun 6, 2023
YouTube
BePractical
53:16
Exploring Damn Vulnerable API
812 views
Sep 19, 2023
YouTube
CyberWarFare Labs
9:12
Simplify - Explain API Security
19 views
2 months ago
YouTube
tech-world
2:21
What Is API Abuse? | How Attackers Misuse Application APIs
3 views
2 months ago
YouTube
The Cyber Basics Channel
See more videos
More like this
Feedback