When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Cross-site request forgery - Wikipedia

    en.wikipedia.org/wiki/Cross-site_request_forgery

    Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf [1]) or XSRF, is a type of malicious exploit of a website or web application where unauthorized commands are submitted from a user that the web application trusts. [2]

  3. Confused deputy problem - Wikipedia

    en.wikipedia.org/wiki/Confused_deputy_problem

    A cross-site request forgery (CSRF) is an example of a confused deputy attack that uses the web browser to perform sensitive actions against a web application. A common form of this attack occurs when a web application uses a cookie to authenticate all requests transmitted by a browser.

  4. Referer spoofing - Wikipedia

    en.wikipedia.org/wiki/Referer_spoofing

    Spoofing often allows access to a site's content where the site's web server is configured to block browsers that do not send referer headers. Website owners may do this to disallow hotlinking. It can also be used to defeat referer checking controls that are used to mitigate Cross-Site Request Forgery attacks.

  5. Cross-site leaks - Wikipedia

    en.wikipedia.org/wiki/Cross-site_leaks

    Cross-site leaks, also known as XS-leaks, is an internet security term used to describe a class of attacks used to access a user's sensitive information on another website. Cross-site leaks allow an attacker to access a user's interactions with other websites. This can contain sensitive information.

  6. Session fixation - Wikipedia

    en.wikipedia.org/wiki/Session_fixation

    A logout function is useful as it allows users to indicate that a session should not allow further requests. Thus attacks can only be effective while a session is active. Note that the following code performs no Cross-site request forgery checks, potentially allowing an attacker to force users to log out of the web application.

  7. JSONP - Wikipedia

    en.wikipedia.org/wiki/JSONP

    Naive deployments of JSONP are subject to cross-site request forgery (CSRF or XSRF) attacks. [12] Because the HTML <script> element does not respect the same-origin policy in web browser implementations, a malicious page can request and obtain JSON data belonging to another site. This will allow the JSON-encoded data to be evaluated in the ...

  8. BREACH - Wikipedia

    en.wikipedia.org/wiki/BREACH

    As a result, clients and servers are either forced to disable HTTP compression completely (thus reducing performance), or to adopt workarounds to try to foil BREACH in individual attack scenarios, such as using cross-site request forgery (CSRF) protection. [4]

  9. Category:Web security exploits - Wikipedia

    en.wikipedia.org/wiki/Category:Web_security_exploits

    Cross-site cooking; Cross-site leaks; Cross-site request forgery; Cross-site scripting; Cross-site tracing; D. Directory traversal attack; DNS rebinding; Double encoding;