When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Cross-site request forgery - Wikipedia

    en.wikipedia.org/wiki/Cross-site_request_forgery

    Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf [1]) or XSRF, is a type of malicious exploit of a website or web application where unauthorized commands are submitted from a user that the web application trusts. [2]

  3. Confused deputy problem - Wikipedia

    en.wikipedia.org/wiki/Confused_deputy_problem

    A cross-site request forgery (CSRF) is an example of a confused deputy attack that uses the web browser to perform sensitive actions against a web application. A common form of this attack occurs when a web application uses a cookie to authenticate all requests transmitted by a browser.

  4. JSONP - Wikipedia

    en.wikipedia.org/wiki/JSONP

    Naive deployments of JSONP are subject to cross-site request forgery (CSRF or XSRF) attacks. [12] Because the HTML <script> element does not respect the same-origin policy in web browser implementations, a malicious page can request and obtain JSON data belonging to another site. This will allow the JSON-encoded data to be evaluated in the ...

  5. BREACH - Wikipedia

    en.wikipedia.org/wiki/BREACH

    As a result, clients and servers are either forced to disable HTTP compression completely (thus reducing performance), or to adopt workarounds to try to foil BREACH in individual attack scenarios, such as using cross-site request forgery (CSRF) protection. [4]

  6. Cross-application scripting - Wikipedia

    en.wikipedia.org/wiki/Cross-application_scripting

    If cross-application scripting is the application equivalent for XSS in web applications, then cross-application request forgery (CARF) is the equivalent of cross-site request forgery (CSRF) in desktop applications.

  7. Vulnerability (computer security) - Wikipedia

    en.wikipedia.org/wiki/Vulnerability_(computer...

    Cross-site request forgery (CSRF) is creating client requests that do malicious actions, such as an attacker changing a user's credentials. [30] Server-side request forgery is similar to CSRF, but the request is forged from the server side and often exploits the enhanced privilege of the server. [30]

  8. Referer spoofing - Wikipedia

    en.wikipedia.org/wiki/Referer_spoofing

    Spoofing often allows access to a site's content where the site's web server is configured to block browsers that do not send referer headers. Website owners may do this to disallow hotlinking. It can also be used to defeat referer checking controls that are used to mitigate Cross-Site Request Forgery attacks.

  9. Wt (web toolkit) - Wikipedia

    en.wikipedia.org/wiki/Wt_(web_toolkit)

    Contains various security features to avoid Cross-site scripting and Cross-site request forgery (CSRF) vulnerabilities; Includes a compact C++ ORM-layer ("Wt::Dbo") Uses the WebSocket networking protocol, if available, for Client–server model of communication, with fallbacks to Ajax or plain web page rendering