Cross-site scripting

Results: 700



#Item
61Revisiting XSS Sanitization Ashar Javed Chair for Network and Data Security Horst G¨ ortz Institute for IT-Security, Ruhr-University Bochum

Revisiting XSS Sanitization Ashar Javed Chair for Network and Data Security Horst G¨ ortz Institute for IT-Security, Ruhr-University Bochum

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:50:55
62Protecting Browsers from DNS Rebinding Attacks Collin Jackson Adam Barth  Andrew Bortz

Protecting Browsers from DNS Rebinding Attacks Collin Jackson Adam Barth Andrew Bortz

Add to Reading List

Source URL: www.abortz.net

Language: English - Date: 2016-01-16 18:17:58
63Blackbox Reversing of XSS Filters  Alexander Sotirov   Introduction

Blackbox Reversing of XSS Filters Alexander Sotirov Introduction

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
64Protecting Browser State from Web Privacy Attacks Collin Jackson Andrew Bortz  Stanford University

Protecting Browser State from Web Privacy Attacks Collin Jackson Andrew Bortz Stanford University

Add to Reading List

Source URL: www.abortz.net

Language: English - Date: 2016-01-16 18:17:58
65WebShield: Enabling Various Web Defense Techniques without Client Side Modifications Zhichun Li§ Tang Yi† Yinzhi Cao‡ Vaibhav Rastogi‡ Yan Chen‡ Bin Liu† Clint Sbisa‡ § NEC Laboratories America ‡ Northwes

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications Zhichun Li§ Tang Yi† Yinzhi Cao‡ Vaibhav Rastogi‡ Yan Chen‡ Bin Liu† Clint Sbisa‡ § NEC Laboratories America ‡ Northwes

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English
66Reporting Status of Vulnerability-related Information about Software Products and Websites - 3rd Quarter ofJuly – September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Re

Reporting Status of Vulnerability-related Information about Software Products and Websites - 3rd Quarter ofJuly – September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Re

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
67Dagstuhl SeminarWeb Application Security 29.03. – Executive Summary Dan Boneh1 , Ulfar Erlingsson2 , Martin Johns3 and Benjamin Livshits4 1

Dagstuhl SeminarWeb Application Security 29.03. – Executive Summary Dan Boneh1 , Ulfar Erlingsson2 , Martin Johns3 and Benjamin Livshits4 1

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2010-08-09 09:34:32
68Server-Side Template Injection: RCE for the modern webapp James Kettle -  - @albinowax Abstract Template engines are widely used by web applications to present dynamic data via web pages and e

Server-Side Template Injection: RCE for the modern webapp James Kettle - - @albinowax Abstract Template engines are widely used by web applications to present dynamic data via web pages and e

Add to Reading List

Source URL: portswigger.net

Language: English - Date: 2015-07-17 11:24:09
69Cross Site Scripting Explained Amit Klein, Sanctum Security Group June 2002  ¤2002 Sanctum Inc.

Cross Site Scripting Explained Amit Klein, Sanctum Security Group June 2002 ¤2002 Sanctum Inc.

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2008-08-26 17:57:08
    70Website Security Statistics Report  2015 About This Report WhiteHat Security’s Website Security Statistics

    Website Security Statistics Report 2015 About This Report WhiteHat Security’s Website Security Statistics

    Add to Reading List

    Source URL: info.whitehatsec.com

    Language: English - Date: 2016-02-25 05:35:53