Cross-site scripting

Results: 700



#Item
51WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding.  “On our current

WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-01-20 16:34:29
52Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill  Bill Chu and Heather Richter Lipford

Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill Bill Chu and Heather Richter Lipford

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2015-07-31 17:48:16
53Reporting Status of Vulnerability-related Information about Software Products and Websites - 1st Quarter ofJanuary – March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Res

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1st Quarter ofJanuary – March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Res

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-05-31 02:00:13
54WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding.  “On our current

WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-01-20 16:34:29
55Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2012-08-16 02:39:46
56WWWTrack: Security, Privacy, Reliability, and Ethics  Session: Defending Against Emerging Threats Exposing Private Information by Timing Web Applications

WWWTrack: Security, Privacy, Reliability, and Ethics Session: Defending Against Emerging Threats Exposing Private Information by Timing Web Applications

Add to Reading List

Source URL: www.abortz.net

Language: English - Date: 2016-01-16 18:17:58
57Reporting Status of Vulnerability-related Information about Software Products and Websites - 2nd Quarter ofApril – June) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Respon

Reporting Status of Vulnerability-related Information about Software Products and Websites - 2nd Quarter ofApril – June) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Respon

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
58Reporting Status of Vulnerability-related Information about Software Products and Websites - 4th Quarter ofOctober – December) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

Reporting Status of Vulnerability-related Information about Software Products and Websites - 4th Quarter ofOctober – December) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
59Server-Side Template Injection: RCE for the modern webapp James Kettle -  - @albinowax Abstract Template engines are widely used by web applications to present dynamic data via web pages and e

Server-Side Template Injection: RCE for the modern webapp James Kettle - - @albinowax Abstract Template engines are widely used by web applications to present dynamic data via web pages and e

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-08-05 21:02:05
60PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks Yinzhi Cao§ , Vinod Yegneswaran† , Phillip Porras† , and Yan Chen§ , {vinod, porras}@csl

PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks Yinzhi Cao§ , Vinod Yegneswaran† , Phillip Porras† , and Yan Chen§ , {vinod, porras}@csl

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2011-11-29 13:06:25