Cross-site request forgery

Results: 270



#Item
161Computing / OWASP / Web application security / Application security / Vulnerability / Cross-site request forgery / SQL injection / ModSecurity / Threat / Computer security / Computer network security / Cyberwarfare

The Web Hacking Incidents Database (WHID) Report: January – June 2009 AppSec DC

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:50
162Computer network security / OWASP / Application security / Cross-site request forgery / Cross-site scripting / Threat model / SQL injection / CCWAPSS / Penetration test / Cyberwarfare / Computer security / Security

Developing Secure Applications with OWASP Martin Knobloch [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:28
163Computer network security / OWASP / Cross-site request forgery / Penetration test / BeanShell / DEVS / Plug-in / Computing / Computer security / Security

German OWASP Day 2012 The OWASP Foundation http://www.owasp.org

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-11-09 12:36:41
164HTML / Form / World Wide Web / PHP / Checkbox / Cross-site request forgery / Ext JS / HTML element / GUI widget / Software / Computing / PHP programming language

Working with Zend\Form Rob Allen PHPNW 12, October 2012 The problem with forms They break the concept of separation of concerns:

Add to Reading List

Source URL: akrabat.com

Language: English - Date: 2013-12-19 04:29:54
165SQL injection / Computing / Data / Information / Security / OWASP / Cross-site request forgery

Agile and Secure Can we do both? OWASP Jerry Hoff

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:25
166Computer security / HTTP / HTTP cookie / Internet privacy / Clickjacking / Cookiejacking / Cross-site request forgery / Hacking / Computing / Social engineering

Cookiejacking Rosario Valotta Agenda !   Me, myself and I !   The IE security zones

Add to Reading List

Source URL: media.hacking-lab.com

Language: English - Date: 2011-06-08 04:51:58
167Computer network security / OWASP / Security / Hacking / Cross-site request forgery / HTTP / Software testing / HTTP cookie / JavaScript / Computer security / Cyberwarfare / Computing

Client-Side Cross-Domain Requests in the Web Browser: Techniques, Policies and Security Pitfalls OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:16
168Ajax / Internet privacy / XML / XMLHttpRequest / Hypertext Transfer Protocol / HTTP cookie / Cross-site request forgery / Proxy server / Cross-Origin Resource Sharing / Computing / Software / HTTP

index A abort method 20 Accept header 180 Accept-Charset header 18 Accept-Encoding header 18

Add to Reading List

Source URL: manning.com

Language: English - Date: 2014-10-14 12:43:26
169Computer network security / Security / Software testing / OWASP / Cross-site scripting / Cross-site request forgery / Web application security / SQL injection / Vulnerability / Computer security / Cyberwarfare / Computing

OWASP Top 10 – 2010 The Top 10 Most Critical Web Application Security Risks Dave Wichers COO, Aspect Security OWASP Board Member

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:56
170Computer network security / Cross-site scripting / Aggregate / OWASP / Vulnerability / Motorways of Switzerland / Web application security / ISO 216 / Cross-site request forgery / Computer security / Cyberwarfare / Software testing

Transforming IT Security & Compliance A Decade of Web Application Security What have we learned? Jason Kent, Director Web Application Security

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
UPDATE