When.com Web Search

  1. Ad

    related to: cross-site request forgery attacks

Search results

  1. Results From The WOW.Com Content Network
  2. Cross-site request forgery - Wikipedia

    en.wikipedia.org/wiki/Cross-site_request_forgery

    Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf [1]) or XSRF, is a type of malicious exploit of a website or web application where unauthorized commands are submitted from a user that the web application trusts. [2]

  3. Confused deputy problem - Wikipedia

    en.wikipedia.org/wiki/Confused_deputy_problem

    A cross-site request forgery (CSRF) is an example of a confused deputy attack that uses the web browser to perform sensitive actions against a web application. A common form of this attack occurs when a web application uses a cookie to authenticate all requests transmitted by a browser.

  4. Cross-site leaks - Wikipedia

    en.wikipedia.org/wiki/Cross-site_leaks

    Cache-timing attacks rely on the ability to infer hits and misses in shared caches on the web platform. [54] One of the first instances of a cache-timing attack involved the making of a cross-origin request to a page and then probing for the existence of the resources loaded by the request in the shared HTTP and the DNS cache.

  5. Referer spoofing - Wikipedia

    en.wikipedia.org/wiki/Referer_spoofing

    Spoofing often allows access to a site's content where the site's web server is configured to block browsers that do not send referer headers. Website owners may do this to disallow hotlinking. It can also be used to defeat referer checking controls that are used to mitigate Cross-Site Request Forgery attacks.

  6. Cross-site scripting - Wikipedia

    en.wikipedia.org/wiki/Cross-site_scripting

    Cross-site scripting (XSS) [a] is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.

  7. Server-side request forgery - Wikipedia

    en.wikipedia.org/wiki/Server-side_request_forgery

    Similar to cross-site request forgery which utilizes a web client, for example, a web browser, within the domain as a proxy for attacks; an SSRF attack utilizes a vulnerable server within the domain as a proxy.

  8. JSONP - Wikipedia

    en.wikipedia.org/wiki/JSONP

    Naive deployments of JSONP are subject to cross-site request forgery (CSRF or XSRF) attacks. [12] Because the HTML <script> element does not respect the same-origin policy in web browser implementations, a malicious page can request and obtain JSON data belonging to another site. This will allow the JSON-encoded data to be evaluated in the ...

  9. Session fixation - Wikipedia

    en.wikipedia.org/wiki/Session_fixation

    A logout function is useful as it allows users to indicate that a session should not allow further requests. Thus attacks can only be effective while a session is active. Note that the following code performs no Cross-site request forgery checks, potentially allowing an attacker to force users to log out of the web application.