Cross-site request forgery

Results: 270



#Item
221HTTP / Computer network security / URI schemes / Uniform resource locator / Ajax / Cross-site request forgery / HTTP cookie / Cross-site scripting / DNS rebinding / Computing / Software / Internet

Towards a Formal Foundation of Web Security Devdatta Akhawe∗ , Adam Barth∗ , Peifung E. Lam† , John Mitchell† and Dawn Song∗ ∗ University of California, Berkeley {devdatta,abarth,dawnsong}@cs.berkeley.edu †

Add to Reading List

Source URL: devd.me

Language: English
222Computer network security / Security / Software testing / OWASP / Cross-site request forgery / Cross-site scripting / SQL injection / Password / Code injection / Computer security / Cyberwarfare / Computing

938 - OWASP Top Ten 2013 Category A10 - Unvalidated Redirects and Forwards[removed]OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
223Software testing / Hacking / Cross-site scripting / Attack patterns / Vulnerability / Code injection / SQL injection / Buffer overflow / Cross-site request forgery / Cyberwarfare / Computer security / Computing

CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2011-03-29 14:10:53
224Security / OWASP / Cross-site request forgery / Cross-site scripting / SQL injection / Authentication / Lightweight Directory Access Protocol / Code injection / Computer security / Cyberwarfare / Computing

[removed]OWASP Top Ten 2007 Category A10 - Failure to Restrict URL Access

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
225PHP frameworks / Web application frameworks / Blog software / Cross-platform software / Drupal / Cross-site scripting / Acquia / Vulnerability / Cross-site request forgery / Software / Computing / Content management systems

Drupal Security White Paper Authors Benjamin James Jeavons Gregory James Knaddison

Add to Reading List

Source URL: drupalsecurityreport.org

Language: English - Date: 2012-02-02 19:05:13
226Access control / Hacking / Confused deputy problem / Access control list / Cross-site request forgery / Access Control Matrix / Filesystem permissions / Capability-based security / Principle of least privilege / Computer security / Computing / Security

ACLs don’t Tyler Close Hewlett-Packard Labs Palo Alto, CA Email: [removed] Abstract

Add to Reading List

Source URL: waterken.sourceforge.net

Language: English - Date: 2009-04-30 13:16:38
2274-Dimethylaminopyridine / Amines / Catalysts / Medicaid / Cross-site request forgery / Snap / Federal assistance in the United States / Healthcare reform in the United States / Presidency of Lyndon B. Johnson

Oregon Department of Human Services; Children, Adults and Families; Child Welfare Policy; CW-AR[removed]Drug Testing

Add to Reading List

Source URL: www.dhs.state.or.us

Language: English - Date: 2010-01-14 18:40:27
228HTTP cookie / Internet privacy / Cross-site request forgery / Directory traversal attack / Computing / Computer security / Cyberwarfare / HTTP

Microsoft Word - Multiple Vulnerabilities in Accoria Web Server V1.docx

Add to Reading List

Source URL: www.ioactive.com

Language: English
229Graphics file formats / Adobe Flash / Computer file formats / Portable software / Cross-site request forgery / JavaScript / Google Chrome / SWF / Adobe Acrobat / Software / Computing / Cross-platform software

HTTP://ONSEC.RU SDRF vulnerability in webapplications and browsers Vladimir Vorontsov[removed]

Add to Reading List

Source URL: onsec.ru

Language: English - Date: 2010-11-01 09:20:00
230Cross-site request forgery / Vulnerability / SpringSource / Apache Tomcat / UTF-8 / Social vulnerability / Debian / Software / Computing / Free software

The Good, The Bad and The Ugly Mark Thomas, Staff Engineer © 2012 SpringSource, by VMware. All rights reserved Agenda

Add to Reading List

Source URL: people.apache.org

Language: English - Date: 2013-02-27 13:13:58
UPDATE