Cross-site request forgery

Results: 270



#Item
111HTTP / Internet privacy / HTTP cookie / Session fixation / Cross-site scripting / Cross-site request forgery / Session hijacking / Session / HTTP header injection / Cyberwarfare / Computer security / Computing

Session Fixation – the Forgotten Vulnerability? Michael Schrank1 1 Bastian Braun2

Add to Reading List

Source URL: web.sec.uni-passau.de

Language: English - Date: 2015-02-24 12:13:25
112Cross-site request forgery / HTTP / Computer network security / Cross-site scripting / Session hijacking / HTTP cookie / Session fixation / Password / JavaScript / Computer security / Cyberwarfare / Computing

A User-level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities 1 1

Add to Reading List

Source URL: web.sec.uni-passau.de

Language: English - Date: 2015-02-24 12:13:25
113World Wide Web / Internet privacy / Cross-site request forgery / Computer network security / URI schemes / Network protocols / HTTP cookie / Cross-site scripting / JavaScript / Computing / HTTP / Internet

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2009-05-24 02:19:34
114Software / Cross-site request forgery / JavaScript / Programming paradigms / Internet privacy / Same origin policy / Gmail / Scripting language / Computing / Cross-platform software / Software engineering

Same Origin Policy Weaknesses kuza55 http://kuza55.blogspot.com

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-24 09:37:56
115Scripting languages / Software testing / Ajax / JavaScript / Cross-platform software / Cross-site scripting / JSON / Cross-site request forgery / Code injection / Computing / Computer security / Cyberwarfare

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications Prateek Saxena§ Steve Hanna§ Pongsin Poosankam‡§ Dawn Song§

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
116Espionage / Malware / Computer crimes / Phishing / Social engineering / Spamming / Cross-site request forgery / Password / Spyware / Cyberwarfare / Computer security / Computer network security

Sites Assure Website Security Suite It’s Not Insurance. It’s Better!

Add to Reading List

Source URL: sitesassure.com

Language: English - Date: 2015-03-12 04:28:57
117Semantic Web / Computing / Language / URI schemes / Compiler construction / Extended Backus–Naur Form / Syntax / Uniform resource identifier / Cross-site request forgery / Formal languages / Grammar / Linguistics

Application Boundaries Enforcer (ABE) NoScript Module Rules Syntax And Capabilities Version 0.3 – Author: Giorgio Maone –

Add to Reading List

Source URL: hackademix.net

Language: English - Date: 2008-12-19 19:02:59
118Google Chrome / Web browsers / Opera Software / HTTP cookie / JavaScript / Chromium / World Wide Web / Cross-site request forgery / Firefox / Software / Portable software / Cloud clients

Analyzing the Dangers Posed by Chrome Extensions Lujo Bauer Shaoying Cai†? Limin Jia Timothy Passaro Yuan Tian Carnegie Mellon University † Singapore Management University ? Institute for Infocomm Research {lbauer,li

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2014-09-17 11:12:36
119Computer network security / Software testing / Cross-site scripting / Hacking / Cross-site request forgery / Vulnerability / Code injection / Penetration test / SQL injection / Computer security / Cyberwarfare / Computing

Damn Vulnerable Web App Ryan Dewhurst, Aralık 2009, WGT E-Dergi 3. Sayı I wanted an application developed in PHP/MySQL that was vulnerable to the most common types of web application vulnerabilities, that I could pract

Add to Reading List

Source URL: webguvenligi.org

Language: English - Date: 2011-08-03 19:42:25
120Cross-site request forgery / Cinema of India / Indian people / Indian films / Hindkowan people / Pran

Annexure II to CSRF 1 ADDITIONAL REQUEST DETAILS 1. Name of Father (required if name exceeds 30 characters and not able to be covered on page 1 of the application form) First Name Middle Name

Add to Reading List

Source URL: www.iitbhu.ac.in

Language: English - Date: 2015-04-07 03:33:05
UPDATE