Cross-site scripting

Results: 700



#Item
481Portable software / Software testing / Software bugs / Firefox / Vulnerability / Cross-site scripting / Security bug / Responsible disclosure / Chromium / Software / Cloud clients / Google Chrome

An Empirical Study of Vulnerability Rewards Programs Matthew Finifter, Devdatta Akhawe, and David Wagner University of California, Berkeley \{ finifter, devdatta, daw\} @cs.berkeley.edu Abstract

Add to Reading List

Source URL: devd.me

Language: English - Date: 2014-11-09 00:08:12
482HTTP / Cross-platform software / Internet privacy / Web 2.0 / Cryptographic protocols / Cross-site scripting / HTTP cookie / Gmail / JavaScript / Computing / Software / Internet

The Emperor’s New APIs: On the (In)Secure Usage of New Client-side Primitives Steve Hanna§ , Eui Chul Richard Shin‡ , Devdatta Akhawe§ , Arman Boehm‡ , Prateek Saxena§ , Dawn Song§ {sch, ricshin, devdatta, boeh

Add to Reading List

Source URL: devd.me

Language: English - Date: 2014-11-09 00:08:12
483Computer network security / Software testing / Cross-site scripting / Vulnerability / SQL injection / W3af / Penetration test / Code injection / JavaScript / Computer security / Cyberwarfare / Computing

Why Johnny Can’t Pentest: An Analysis of Black-box Web Vulnerability Scanners Adam Doup´e, Marco Cova, and Giovanni Vigna University of California, Santa Barbara {adoupe,marco,vigna}@cs.ucsb.edu

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2010-05-14 00:26:20
484Firefox / Malware / Zero-day attack / Google Chrome / Vulnerability / Ransomware / Cross-site scripting / Adobe Flash / Patch Tuesday / Software / Computer network security / Hacking

Department of Homeland Security Daily Open Source Infrastructure Report

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2014-08-13 16:31:47
485Markup languages / Cloud clients / Portable software / HTML / Same origin policy / Cross-site scripting / Trusted computing base / JavaScript / Ring / Software / Computing / Google Chrome

Privilege Separation in HTML5 Applications Devdatta Akhawe, Prateek Saxena, Dawn Song University of California, Berkeley {devdatta,prateeks,dawnsong}@cs.berkeley.edu Abstract

Add to Reading List

Source URL: devd.me

Language: English - Date: 2014-11-09 00:08:12
486HTTP / Cross-platform software / Internet privacy / Web 2.0 / Cryptographic protocols / Cross-site scripting / HTTP cookie / Gmail / JavaScript / Computing / Software / Internet

The Emperor’s New APIs: On the (In)Secure Usage of New Client-side Primitives Steve Hanna§ , Eui Chul Richard Shin‡ , Devdatta Akhawe§ , Arman Boehm‡ , Prateek Saxena§ , Dawn Song§ {sch, ricshin, devdatta, boeh

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2010-08-09 16:01:23
487Computing / Electronic commerce / Application firewall / Web application security / Software testing / OWASP / Application security / Cross-site scripting / Denial-of-service attack / Computer security / Cyberwarfare / Computer network security

Web Application Firewall Protect your website against SQL injections, cross-site scripting attacks and more CloudFlare’s Web Application Firewall (WAF) protects your website from SQL injection, cross-site scripting (X

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2014-09-02 14:18:50
488Computing / Software testing / Security / Application security / Penetration test / Vulnerability / OWASP / Web application security / Cross-site scripting / Computer security / Cyberwarfare / Computer network security

Jumpstart a Web Application Secure Coding Program: A Five Step Process SANS STI Application Security Written Assignment Author:  Jim  Beechey,  [removed]   Advisor:  Johannes  Ulrich  

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-10-09 13:59:40
489Advertising-free media / Anti-spam / Internet privacy / Cross-site scripting / JavaScript / Cross-site request forgery / AdBlock / Adblock Plus / Web storage / Software / Computing / Google Chrome

Advanced Chrome Extension Exploitation Leveraging API powers for Better Evil Advanced Chrome Extension Exploitation Leveraging API powers for Better Evil Krzysztof Kotowicz ­ [removed]

Add to Reading List

Source URL: kyleosborn.com

Language: English - Date: 2012-07-24 19:02:10
490Computer network security / Software testing / Crime prevention / National security / Vulnerability / Cross-site scripting / Penetration test / Internet Information Services / ASP.NET / Computer security / Cyberwarfare / Computing

ИНФОГРАФИКА_WEB

Add to Reading List

Source URL: www.ptsecurity.com

Language: English - Date: 2014-01-21 07:13:40
UPDATE