Cross-site request forgery

Results: 270



#Item
51HTTP / Computer crimes / Computer network security / Internet ethics / Cross-site request forgery / HTTP cookie / Phishing / Internet privacy / JavaScript / Software / Computing / Google Chrome

All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian, Carnegie Me

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
52Internet / DNS rebinding / Cross-site request forgery / HTTP cookie / Firewall / Stack buffer overflow / Denial-of-service attack / Firefox / Malware / Computing / Computer network security / Software

CS 155: Spring 2014 June 9, 2014 CS 155 Final Exam This exam is open book and open notes. You may use course notes and documents that you have stored on a laptop, but you may NOT use the network connection on your laptop

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-05-18 15:16:38
53Computer network security / Software testing / Hacking / Vulnerability / CVSS / Cross-site scripting / Cross-site request forgery / Code injection / SQL injection / Cyberwarfare / Computer security / Computing

Web Application Scan Document Revision Initial Report Prepared By: AppCheck-NG

Add to Reading List

Source URL: appcheck-ng.com

Language: English - Date: 2014-09-08 05:22:28
54Cross-site request forgery / OWASP / Cross-site scripting / Computer security / Cyberwarfare / Security

Ghosts  of  XSS  Past,  Present   and  Future.       Jim  Manico  

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 17:07:30
55Cross-site scripting / SQL injection / Plug-in / JavaScript / Application security / Cloud computing / Cross-site request forgery / ArcSight / Computing / Cyberwarfare / Computer security

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:18
56Cross-site scripting / SQL injection / Plug-in / JavaScript / Application security / Cloud computing / Cross-site request forgery / ArcSight / Computing / Cyberwarfare / Computer security

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:18
57JavaScript / Scripting languages / Software architecture / Portable software / Cross-site request forgery / HTTP cookie / Mashup / Cross-site scripting / Google Chrome / Software / Computing / Web development

Toward Principled Browser Security Edward Z. Yang1 Deian Stefan1 John Mitchell1 David Mazi`eres1 Petr Marchenko2 Brad Karp2 1 Stanford University 2 University College London A BSTRACT To ensure the confidentiality and in

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-12-02 06:10:56
58Web development / JavaScript / Security / Computer network security / Ajax / OWASP / XMLHttpRequest / Cross-site request forgery / Web 2.0 / Computing / World Wide Web / Software

Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) Shreeraj Shah Blueinfy Solutions Pvt. Ltd.

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:09:08
59Software testing / Computer network security / Cross-site scripting / Cross-site request forgery / Plug-in / Application security / Penetration test / Vulnerability / SQL injection / Cyberwarfare / Computer security / Computing

Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:13
60Software testing / Computer network security / Cross-site scripting / Cross-site request forgery / Plug-in / Application security / Penetration test / Vulnerability / SQL injection / Cyberwarfare / Computer security / Computing

Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:13
UPDATE