• OWASP Top 10 For Android - Java
    • OWASP Top 10 for Desktop - C/C++
    • OWASP Top 10 for API
    • OWASP Top 10 for Web
    • OWASP Top 10 for LLM - 2025
    • Front-end Top 5
    • AWS Top 10
    • OWASP Top 10 for iOS
    • Docker CLI Top 10
    • Docker Compose Top 10
    • OWASP Top 10 for Kubernetes
  • Try SCORM
  • Plans
  • Courses
  • Blog
  • About
  • Plans & Pricing
  • About Company
  • Try SCORM
  • Get Your Free Trial
  • Book a Demo
  • Blog
  • OWASP Top 10 For Android - Java
  • OWASP Top 10 for Desktop - C/C++
  • OWASP Top 10 for API
  • OWASP Top 10 for Web
  • OWASP Top 10 for LLM - 2025
  • Front-end Top 5
  • AWS Top 10
  • OWASP Top 10 for iOS
  • Docker CLI Top 10
  • Docker Compose Top 10
  • OWASP Top 10 for Kubernetes
  • DEMO VIDEO

Kontra Front-end Top 5

KONTRA's Front-end Top 5 is a series of free interactive application security training modules that teach developers how to identify and mitigate security vulnerabilities on the front-end side of their applications.

Angular

  • Cross Site Request Forgery

    Cross Site Request Forgery
  • Direct DOM Manipulation XSS

    Direct DOM Manipulation XSS
  • Template Concatenation XSS

    Template Concatenation XSS
  • Sanitization Misuse XSS

    Sanitization Misuse XSS

React

  • Cross Site Request Forgery

    Cross Site Request Forgery
  • Direct DOM Manipulation XSS

    Direct DOM Manipulation XSS
  • Components with Known Vulnerabilities

    Components with Known Vulnerabilities
  • Untrusted HTML Rendering XSS

    Untrusted HTML Rendering XSS

Vue.js

  • Untrusted Template Usage XSS

    Untrusted Template Usage XSS
  • Untrusted HTML Rendering XSS

    Untrusted HTML Rendering XSS
  • Direct DOM Manipulation XSS

    Direct DOM Manipulation XSS
  • Cross Site Request Forgery

    Cross Site Request Forgery

JavaScript

  • Direct DOM Manipulation XSS

    NEW
    Direct DOM Manipulation XSS
  • Untrusted Template Usage

    NEW
    Untrusted Template Usage
  • Cross Site Request Forgery

    NEW
    Cross Site Request Forgery
  • Untrusted HTML Rendering XSS

    NEW
    Untrusted HTML Rendering XSS

TypeScript

  • Untrusted HTML Rendering XSS

    NEW
    Untrusted HTML Rendering XSS
  • Cross Site Request Forgery

    NEW
    Cross Site Request Forgery
  • Untrusted Template Usage

    NEW
    Untrusted Template Usage
  • Direct DOM Manipulation XSS

    NEW
    Direct DOM Manipulation XSS
Kontra Logo

MENU

  • Kontra
  • About
  • Blog
  • Book a Demo
  • Privacy Policy
  • Support

Security Compass Technologies Ltd.

325 Front St. West,
Suite 103,
Toronto, ON,
M5V 2Y1, Canada
contact@securitycompass.com

Copyright © 2025 Security Compass Technologies Ltd.
Embed Exercise

Use the following code snippet to embed the exercise card on your web page, blog or wiki

Demo Video
Kontra demo video
Get Your Free Trial
Thank you for your interest in
Kontra Application Security by Security Compass!
A sales representative will be in touch soon
to arrange your free trial.

Access our Free OWASP Top 10 for Web
Enter your information below to join our referral
program and gain FREE access for 14 days
Follow the steps below to get FREE access to our OWASP top 10 for Web course for 14 days
  1. Simply copy the LinkedIn message below
  2. Post the message on your LinkedIn profile
  3. We will contact you as soon as possible on LinkedIn and send you an invite to access our OWASP Top 10 for Web course
IMPORTANT!
Make sure you confirm the tag @ThriveDX Enterprise after pasting the text below in your LinkedIn to avoid delays in getting access to your account.
instruction
Ready to share?
Take me to linkedin now >
Thank you for sharing!

We use cookies to ensure you get the best experience on our website. Accept
Read more