Cross-site scripting

Results: 700



#Item
271Ethics / Application security / Penetration test / System testing / Cross-site scripting / Vulnerability / Security testing / Trust / Software testing / Cyberwarfare / Computer security

INTER-TRUST – ICT FP7- G.A[removed]Interoperable Trust Assurance Infrastructure Proceedings of the first INTERTRUST workshop

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2015-02-06 09:06:35
272

Kopya Kağıtları Siteler arası (ötesi) betik çalıştırma (Cross Site Scripting) Bu liste Robert Hansen’in izni ile yeniden oluşturulmuş ve en son 28 Nisan 2005’te yenilenmiştir. Listenin en yeni sürümü h

Add to Reading List

Source URL: www.webguvenligi.org

Language: Turkish - Date: 2008-08-15 14:01:58
    273Computer network security / Software testing / Cross-site scripting / Hacking / Cross-site request forgery / Vulnerability / Code injection / Penetration test / SQL injection / Computer security / Cyberwarfare / Computing

    Damn Vulnerable Web App Ryan Dewhurst, Aralık 2009, WGT E-Dergi 3. Sayı I wanted an application developed in PHP/MySQL that was vulnerable to the most common types of web application vulnerabilities, that I could pract

    Add to Reading List

    Source URL: webguvenligi.org

    Language: English - Date: 2011-08-03 19:42:25
    274Personal information managers / Cloud clients / Cross-platform software / Webmail / Yahoo! Mail / Yahoo! Messenger / Keychain / Cross-site scripting / Yahoo! / Computing / Software / Email

    PDF Document

    Add to Reading List

    Source URL: www.riapple.com

    Language: English - Date: 2013-03-15 22:46:51
    275Cross-platform software / Scripting languages / Computer network security / Software testing / Cross-site scripting / PHP programming language / Code injection / SQL injection / Vulnerability / Computing / Cyberwarfare / Computer security

    Journal of Computer Security[removed]–907 DOI[removed]JCS[removed]IOS Press 861

    Add to Reading List

    Source URL: iseclab.org

    Language: English - Date: 2010-09-29 15:20:37
    276Computer network security / Computing / Risk / Hacking / Vulnerability / Cross-site scripting / CVSS / Penetration test / Fortify Software / Cyberwarfare / Computer security / Software testing

    White paper HP 2012 Cyber Risk Report

    Add to Reading List

    Source URL: www.hpenterprisesecurity.com

    Language: English - Date: 2013-02-25 11:05:35
    277Computer network security / Cross-site scripting / Cross-site request forgery / JavaScript / Rapid7 / Instructure / Penetration test / Resolution / SQL injection / Computer security / Computing / Software

    CANVAS by Instructure Bugcrowd Flex Program Results December 2014 Executive Summary Bugcrowd Inc was engaged by Instructure to perform a Flex Bounty program, commonly known

    Add to Reading List

    Source URL: www.canvaslms.com

    Language: English - Date: 2015-04-14 16:58:35
    278Cross-site scripting / JavaScript / Firefox / Chrome Web Store / Code injection / Internet Explorer / Principle of least privilege / Safari / Add-on / Software / Google Chrome / News aggregators

    An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley [removed], [removed], [removed]

    Add to Reading List

    Source URL: nicholas.carlini.com

    Language: English - Date: 2013-10-16 18:28:56
    279Software testing / Computer network security / Source code / Hacking / Vulnerability / Penetration test / Code review / Cross-site scripting / Software quality / Computer security / Cyberwarfare / Computing

    Report on Source Code Security Analysis

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2015-03-30 23:00:24
    280Database management systems / Computer languages / Data management / Scripting languages / Monica S. Lam / SQL / Code injection / Cross-site scripting / Java / Computing / Software engineering / Cross-platform software

    Securing Web Applications with Static and Dynamic Information Flow Tracking Monica S. Lam Michael Martin

    Add to Reading List

    Source URL: suif.stanford.edu

    Language: English - Date: 2007-12-15 19:41:29
    UPDATE