When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Cross-site request forgery - Wikipedia

    en.wikipedia.org/wiki/Cross-site_request_forgery

    The web server will not be able to identify the forgery because the request was made by a user that was logged in, and submitted all the requisite cookies. Cross-site request forgery is an example of a confused deputy attack against a web browser because the web browser is tricked into submitting a forged request by a less privileged attacker.

  3. Cross-site leaks - Wikipedia

    en.wikipedia.org/wiki/Cross-site_leaks

    Cross site leak attacks require that the attacker identify at least one state-dependent URL in the victim app for use in the attack app. Depending on the victim app's state, this URL must provide at least two responses. A URL can be crafted, for example, by linking to content that is only accessible to the user if they are logged into the ...

  4. Confused deputy problem - Wikipedia

    en.wikipedia.org/wiki/Confused_deputy_problem

    A cross-site request forgery (CSRF) is an example of a confused deputy attack that uses the web browser to perform sensitive actions against a web application. A common form of this attack occurs when a web application uses a cookie to authenticate all requests transmitted by a browser.

  5. Session fixation - Wikipedia

    en.wikipedia.org/wiki/Session_fixation

    A logout function is useful as it allows users to indicate that a session should not allow further requests. Thus attacks can only be effective while a session is active. Note that the following code performs no Cross-site request forgery checks, potentially allowing an attacker to force users to log out of the web application.

  6. Cross-site scripting - Wikipedia

    en.wikipedia.org/wiki/Cross-site_scripting

    Cross-site scripting (XSS) [a] is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.

  7. Server-side request forgery - Wikipedia

    en.wikipedia.org/wiki/Server-side_request_forgery

    Server-side request forgery (SSRF) is a type of computer security exploit where an attacker abuses the functionality of a server causing it to access or manipulate information in the realm of that server that would otherwise not be directly accessible to the attacker.

  8. HTTP header injection - Wikipedia

    en.wikipedia.org/wiki/HTTP_header_injection

    HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol (HTTP) headers are dynamically generated based on user input.

  9. Self-XSS - Wikipedia

    en.wikipedia.org/wiki/Self-XSS

    Self-XSS (self cross-site scripting) is a type of security vulnerability used to gain control of victims' web accounts. In a Self-XSS attack, the victim of the attack runs malicious code in their own web browser, thus exposing personal information to the attacker.