Cross-site request forgery

Results: 270



#Item
241FireEye /  Inc. / Vulnerability / Common Vulnerabilities and Exposures / Cross-site request forgery / Cross-site scripting / Code injection / Arbitrary code execution / OpenSSL / Computer security / Cyberwarfare / Failure

Security Bulletin Revised July 8, 2014 FireEye Security Bulletin

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-07-08 17:06:03
242Computer network security / Cross-site scripting / Software testing / Malware / Cross-site request forgery / HTTP cookie / JavaScript / Session hijacking / Vulnerability / Cyberwarfare / Computer security / Computing

Recommended Practice Case Study: Cross-Site Scripting February 2007 iii

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-09-11 17:12:23
243Cloud standards / Internet standards / OAuth / Cryptographic protocols / Access token / Transport Layer Security / Network access server / Hypertext Transfer Protocol / Cross-site request forgery / Computing / Internet protocols / Internet

Internet Engineering Task Force (IETF) Request for Comments: 5849 Category: Informational ISSN: [removed]E. Hammer-Lahav, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-04-20 19:53:50
244JavaScript / Scripting languages / Software architecture / Portable software / Cross-site request forgery / HTTP cookie / Mashup / Cross-site scripting / Google Chrome / Software / Computing / Web development

Toward Principled Browser Security Edward Z. Yang1 Deian Stefan1 John Mitchell1 David Mazi`eres1 Petr Marchenko2 Brad Karp2 1 Stanford University 2 University College London A BSTRACT To ensure the confidentiality and in

Add to Reading List

Source URL: ezyang.com

Language: English - Date: 2013-05-22 01:38:46
245Web development / Ajax / Security / JavaScript / OWASP / Computer network security / Cross-site scripting / Cross-site request forgery / JQuery / Computing / Software / World Wide Web

JavaScript-based ESAPI: An In-Depth Overview Marcus Niemietz [removed] Practical Work

Add to Reading List

Source URL: esapi4js.mniemietz.de

Language: English - Date: 2013-09-15 03:26:35
246Computer network security / Hacking / Software testing / Vulnerability / Cross-site scripting / CVSS / Zero-day attack / Cross-site request forgery / SQL injection / Cyberwarfare / Computer security / Failure

Microsoft Word - vuln2008q1-e.doc

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-02-19 22:24:10
247Computer network security / Hacking / Software testing / Vulnerability / Cross-site scripting / CVSS / Zero-day attack / SQL injection / Cross-site request forgery / Cyberwarfare / Computer security / Failure

Microsoft Word - vuln2008q2-e.doc

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-02-19 22:24:10
248Computer network security / Hacking / Software testing / Vulnerability / Cross-site scripting / CVSS / Zero-day attack / SQL injection / Cross-site request forgery / Cyberwarfare / Computer security / Failure

Reporting Status of Vulnerability-related Information for Software Products, etc. - 2nd Quarter of[removed]April – June) Information-Technology Promotion Agency, Japan (IPA) and JPCERT Coordination Center (JPCERT/CC), a

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-02-19 22:24:10
249Scripting languages / HTTP / Cross-site scripting / Software testing / Uniform resource locator / Cross-site request forgery / SQL injection / JavaScript / Vulnerability / Computing / Software / Computer security

Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications Marco Balduzzi∗, Carmen Torrano Gimenez ‡, Davide Balzarotti∗, and Engin Kirda∗ § ∗ Institute Eurecom, Sophia Antipolis

Add to Reading List

Source URL: www.iseclab.org

Language: English - Date: 2011-02-01 09:33:41
UPDATE