Cross-site request forgery

Results: 270



#Item
151Network architecture / DNS rebinding / Internet / NoScript / IP address / Cross-site request forgery / OpenDNS / Transmission Control Protocol / Domain name system / Computer network security / Computing

How to Hack Millions of Routers

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2010-08-20 13:34:12
152Software testing / Security / Penetration test / Hacking / OWASP / Application security / Vulnerability / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Computer network security

Automated vs. Manual: You can’t filter The Stupid AppSec DC Charles Henderson

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:20
153NoScript / JavaScript / Cross-site request forgery / Hooking / Software / Computing / Mozilla add-ons

The First, Toughest and Messiest XSS Filter Giorgio Maone [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-13 17:43:37
154Computer network security / OWASP / Software testing / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Security

OWASP AppSec DC 2009 Conference Jeff Williams, OWASP Board Chair The OWASP Mission First I’d like to introduce the OWASP Board (Tom, Dave, Dinis,

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:21
155Public safety / Crime prevention / Video / Computer network security / Cross-site scripting / Closed-circuit television / Cross-site request forgery / IP camera / IP address / Security / National security / Surveillance

ID THEFTS Design Flaws in IP Surveillance Cameras Exploiting Web Interfaces IP surveillance cameras are used extensively for monitoring of live

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:32
156System software / PHP programming language / Form / World Wide Web / Cross-site request forgery / Checkbox / Ext JS / HTML element / GUI widget / Software / Computing / HTML

Working with Zend\Form Rob Allen ZendCon, October 2012 The problem with forms They break the concept of separation of concerns!

Add to Reading List

Source URL: akrabat.com

Language: English - Date: 2013-12-19 04:29:58
157JavaScript / Adobe Acrobat / OWASP / Portable Document Format / World Wide Web / Web server / ASP.NET / Cross-site scripting / Cross-site request forgery / Software / Computing / Cross-platform software

The Universal XSS PDF Vulnerability Ofer Shezaf OWASP IL Chapter leader CTO, Breach Security

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:20
158Computing / Cross-site request forgery / OWASP / Cross-site scripting / Web application security / Vulnerability / Application security / Aggregate / WebScarab / Cyberwarfare / Computer security / Computer network security

OWASP Top[removed]Dave Wichers OWASP Top 10 Project Lead OWASP Board Member COO/Cofounder, Aspect Security

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-03 09:41:55
159Computing / Security / OWASP / Software testing / Web application security / Application security / Application firewall / Cross-site request forgery / Vulnerability / Computer security / Cyberwarfare / Computer network security

OWASP AppSec Resarch 2013 Conference http://www.owasp.org/index.php/AppSecEU2013 WASC/OWASP WAFEC From industry to community project

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-08-26 18:02:53
160JavaScript / Web development / OWASP / XMLHttpRequest / Cross-site request forgery / JSON / Document Object Model / Web application / Cross-site scripting / Computing / World Wide Web / Ajax

Development Issues within AJAX Applications: How to Divert Threats OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:11
UPDATE