Cross-site request forgery

Results: 270



#Item
231JavaScript / HTTP cookie / World Wide Web / HTML / Web browser / Cross-site request forgery / Data URI scheme / Website / Server-side scripting / Computing / Scripting languages / Internet

tw_book.book Page ix Tuesday, October 18, [removed]:07 AM CONTENTS IN DETAIL PREFACE xvii

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2012-02-08 15:24:22
232Ethics / HTTP cookie / Privacy / Registered user / Google Chrome / Local shared object / Cross-site request forgery / Criticism of Facebook / Internet privacy / Software / Computing

Privacy leakage vs. Protection measures: the growing disconnect Balachander Krishnamurthy Konstantin Naryshkin

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2011-05-25 21:11:37
233Computer network security / Hacking / Software testing / Vulnerability / Cross-platform software / Scripting languages / Cross-site scripting / Cross-site request forgery / Buffer overflow / Cyberwarfare / Computer security / Computing

Microsoft Word - Vulnerability Type Distributions in CVE.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-06-07 12:01:36
234Computer network security / Actuarial science / Hacking / Software testing / Cross-site request forgery / Threat model / Threat / Risk management / Vulnerability / Security / Computer security / Cyberwarfare

Automating Threat Modeling through the Software Development Life-Cycle Guifr´e Ruiz1 , Elisa Heymann1 , Eduardo C´esar1 and Barton P. Miller2 Abstract— Fixing software security issues early in the development life-cy

Add to Reading List

Source URL: www.jornadassarteco.org

Language: English - Date: 2012-07-16 17:17:54
235Computer network security / Hacking / Software testing / Vulnerability / Cross-platform software / Scripting languages / Cross-site scripting / Cross-site request forgery / Buffer overflow / Cyberwarfare / Computer security / Computing

Microsoft Word - Vulnerability Type Distributions in CVE.doc

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-06-07 12:03:43
236Ethics / HTTP cookie / Privacy / Registered user / Google Chrome / Cross-site request forgery / Web bug / Software / Computing / Internet privacy

Privacy leakage vs. Protection measures: the growing disconnect Balachander Krishnamurthy AT&T Labs–Research [removed]

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:02
237CVSS / Vulnerability / National Vulnerability Database / Cross-site request forgery / Social vulnerability / Security Content Automation Protocol / Security risk / Computer security / Cyberwarfare / Security

CVSS Implementation Guidance

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-04-28 10:50:19
238Cross-site scripting / HTML / Social engineering / NoScript / Cross-site request forgery / JavaScript / Google Chrome / Framing / Clickjacking / Software / Computing / World Wide Web

X-Frame-Options: All about Clickjacking? “How else do X-Frame-Options protect my website” A poem by Frederik Braun (Mozilla) and Mario Heiderich (Cure53) The X-Frame-Options header is known to be a good measurement a

Add to Reading List

Source URL: cure53.de

Language: English - Date: 2014-07-15 15:01:59
239JavaScript / World Wide Web / Man-in-the-middle attack / Malware / Form / Password / Cross-site request forgery / Computing / Software / Cross-platform software

HProxy: Client-side detection of SSL stripping attacks Nick Nikiforakis, Yves Younan, and Wouter Joosen IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:07:10
240Software bugs / Heap spraying / Buffer overflow / Shellcode / Address space layout randomization / NOP slide / Cross-site request forgery / NOP / JavaScript / Cyberwarfare / Computing / Computer security

BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks Francesco Gadaleta, Yves Younan, and Wouter Joosen IBBT-Distrinet, Katholieke Universiteit Leuven, 3001, Leuven Belgium Abstract. Web brows

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:06:55
UPDATE