Cross-site scripting

Results: 700



#Item
111Microsoft Word - vuln2010q3-e.doc

Microsoft Word - vuln2010q3-e.doc

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-05-28 22:03:35
112Web Application Scan  Document Revision Initial Report Prepared By:  AppCheck-NG

Web Application Scan Document Revision Initial Report Prepared By: AppCheck-NG

Add to Reading List

Source URL: appcheck-ng.com

Language: English - Date: 2014-09-08 05:22:28
113Whitepaper – Attacking Android browsers via intent scheme URLs  Takeshi Terada / Mitsui Bussan Secure Directions, Inc. MarchIntroduction

Whitepaper – Attacking Android browsers via intent scheme URLs Takeshi Terada / Mitsui Bussan Secure Directions, Inc. MarchIntroduction

Add to Reading List

Source URL: www.mbsd.jp

Language: English - Date: 2014-10-29 20:39:11
114Ghosts	
  of	
  XSS	
  Past,	
  Present	
   and	
  Future.	
   	
      Jim	
  Manico	
  

Ghosts  of  XSS  Past,  Present   and  Future.       Jim  Manico  

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 17:07:30
115PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:18
116Cross-Site Scripting Attacks in Social Network APIs Yuqing Zhang Xiali Wang  University of Chinese Academy of Sciences

Cross-Site Scripting Attacks in Social Network APIs Yuqing Zhang Xiali Wang University of Chinese Academy of Sciences

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2013-05-23 04:10:01
117PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:18
118Toward Principled Browser Security Edward Z. Yang1 Deian Stefan1 John Mitchell1 David Mazi`eres1 Petr Marchenko2 Brad Karp2 1 Stanford University 2 University College London A BSTRACT To ensure the confidentiality and in

Toward Principled Browser Security Edward Z. Yang1 Deian Stefan1 John Mitchell1 David Mazi`eres1 Petr Marchenko2 Brad Karp2 1 Stanford University 2 University College London A BSTRACT To ensure the confidentiality and in

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-12-02 06:10:56
119STREWS Strategic Research Roadmap for European Web Security FP7-ICT, Project Nohttp://www.strews.eu/

STREWS Strategic Research Roadmap for European Web Security FP7-ICT, Project Nohttp://www.strews.eu/

Add to Reading List

Source URL: www.strews.eu

Language: English - Date: 2015-05-12 14:33:32
120THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015  THE EVOLUTION

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:16