Cross-site request forgery

Results: 270



#Item
211Cyberwarfare / Password / Cross-site scripting / Web application security / HTTP Secure / HTTP cookie / Login / Cross-site request forgery / HTTP Strict Transport Security / HTTP / Computing / Computer security

Securing Web Application Technologies (SWAT) CH E CKL I S T The SWAT Checklist provides an easy to reference set of best practices that raise awareness and help development teams create more secure applications. It’s a

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-02-12 10:08:44
212Cyberwarfare / FireEye /  Inc. / Computer network security / Software testing / Social vulnerability / Cross-site request forgery / Vulnerability / Computer security / Risk / Security

Support Notice FireEye Notice: Disclosed Vulnerabilities July 9, 2014 On July 7, 2014, FireEye responded to a public disclosure of some suspected security issues in the FireEye AX product line by a researcher, Jean-Mari

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-08-11 22:29:04
213Graphics file formats / Computer network security / Application programming interfaces / Internet privacy / Cross-site request forgery / SWF / HTTP cookie / Same origin policy / Web 2.0 / Software / Computing / Adobe Flash

Analyzing the Crossdomain Policies of Flash Applications Dongseok Jang Aishwarya Venkataraman G. Michael Sawka

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-06-05 19:42:50
214URI schemes / World Wide Web / Information retrieval / URL redirection / HTTP referer / Tree / Causality / Cross-site request forgery / Uniform resource locator / Information science / Internet

Towards Sound HTTP Request Causation Inference Kristin Stephens-Martinez Abstract such as long sequences of HTTP requests “daisy chained”

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-09-13 13:01:07
215Cybercrime / Cross-site request forgery / Computer crimes / Cross-site scripting / HTTP cookie / Phishing / JavaScript / Internet privacy / Google Chrome / Software / Computing / HTTP

All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian, Carnegie Me

Add to Reading List

Source URL: wnss.sv.cmu.edu

Language: English - Date: 2014-05-21 14:14:22
216Scripting languages / Software testing / Ajax / JavaScript / Cross-platform software / Cross-site scripting / JSON / Cross-site request forgery / Code injection / Computing / Computer security / Cyberwarfare

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications Prateek Saxena§ Steve Hanna§ Pongsin Poosankam‡§ Dawn Song§

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2010-03-22 11:25:35
217Hacking / Software testing / Vulnerability / Cross-site request forgery / Cross-site scripting / C / Internet Explorer / Patch / Pwnie Awards / Computing / Cyberwarfare / Computer security

Retroactive Auditing Xi Wang Nickolai Zeldovich M. Frans Kaashoek MIT CSAIL ABSTRACT Retroactive auditing is a new approach for detecting past intrusions

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
218Computer network security / Cross-site scripting / Penetration test / OWASP / Vulnerability / Cross-site request forgery / HTTP cookie / Computer security / Cyberwarfare / Software testing

Feeling insecure about your web testing? Who is being hacked?

Add to Reading List

Source URL: www.aurainfosec.com

Language: English - Date: 2014-05-08 23:39:48
219Software bugs / Cross-site request forgery / Cross-site scripting / Buffer overflow / SQL injection / Code injection / Uncontrolled format string / Cyberwarfare / Computer security / Failure

[removed]Uncontrolled Format String 212 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
220Google Chrome / HTTP / Sandbox / XMLHttpRequest / Same origin policy / Web application / Firefox / PhoneGap / Cross-site scripting / Software / Ajax / Cross-site request forgery

X-­‐Excess   WebApps  meet  Na1veApps     Mike  Haworth,  AuraInfosec   Kirk  Jackson,  AuraInfosec  (re1red)  

Add to Reading List

Source URL: www.aurainfosec.com

Language: English - Date: 2014-05-08 23:39:32
UPDATE