Cross-site scripting

Results: 700



#Item
491Computer network security / Software testing / Cross-site request forgery / Cross-site scripting / ASP.NET / SQL injection / Code injection / Vulnerability / Computer security / Computing / Cyberwarfare / Software

.NET Threats & Countermeasures Hands-on Training (2 Days) Course description Secure programming is the best defense against hackers. This multilayered Hands on course will demonstrate live real time hacking methods , ana

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-11 09:56:52
492Crime prevention / National security / Software testing / Application security / Vulnerability / OWASP / Code audit / Information security / Cross-site scripting / Computer security / Security / Cyberwarfare

Analyzing and Securing Enterprise Application Code by Blueinfy (Shreeraj Shah & Vimal Patel) Overview: Enterprise application source code, independent of languages and platforms, is a major source of vulnerabilities. The

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-08-20 23:01:58
493Web syndication / Social information processing / Cross-site scripting / Web feed / Atom / News aggregator / Web 2.0 / Malware / Cross-site request forgery / Computing / World Wide Web / RSS

Microsoft Word - 2F8E8CC3.doc

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-08-01 12:48:59
494Failure / Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / CVSS / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1st Quarter of[removed]January – March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Res

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-09-02 22:11:32
495Web development / Cross-site scripting / HTTP / JavaScript / Cross-site request forgery / Web server / Hyperlink / Microsoft Word / Microsoft Office / Computing / Software / World Wide Web

Evading Web XSS Filters through Word (Microsoft Office and Open Office) in Enterprise Web Applications

Add to Reading List

Source URL: www.secniche.org

Language: English - Date: 2009-03-11 10:50:37
496Cross-site scripting / JavaScript / Security / ECMAScript / Google Chrome / OWASP / Caja project / Document Object Model / Sandbox / Computing / Software / Scripting languages

What is the Future of Automated XSS Defense Tools? Jim Manico SANS AppSec March 8, [removed]:20pm - 5:20pm) 0

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:03
497Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Buffer overflow / Cyberwarfare / Computing / Computer security

Microsoft Word - Fortify_TaxonomyofSoftwareSecurityErrors

Add to Reading List

Source URL: www.hpenterprisesecurity.com

Language: English - Date: 2014-10-01 10:20:24
498Computer network security / Software testing / Hacking / Vulnerability / Application security / Cross-site scripting / McAfee / Social vulnerability / Qualys / Computer security / Cyberwarfare / Risk

Solution Brief Scanning Web Applications for Vulnerabilities Safeguarding your critical web applications The clock is ticking as web applications take center stage as the point of entry for

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:08
499JavaScript / Cross-site scripting / World Wide Web / Client-side / Opera / Web development / SAP Logon Ticket / Software / Computing / Password

research highlights doi:[removed][removed]Technical Perspective Tools for Information to Flow Securely and Swift-ly

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2010-02-26 16:09:05
500Failure / Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / CVSS / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Reporting Status of Vulnerability-related Information about Software Products and Websites - 2nd Quarter of[removed]April – June) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Respon

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-09-02 22:11:32
UPDATE