Submit Search
Upload
Abusing Windows Opener To Bypass CSRF Protection
•
1 like
•
333 views
Narendra Bhati
Follow
Published On Exploit DB Papers https://www.exploit-db.com/docs/38193.pdf
Read less
Read more
Technology
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
OWASP Pune Chapter : Dive Into The Profound Web Attacks
OWASP Pune Chapter : Dive Into The Profound Web Attacks
Narendra Bhati
Club hack 2011 precon ctf walkthrough
Club hack 2011 precon ctf walkthrough
n|u - The Open Security Community
Secure Programming In Php
Secure Programming In Php
Akash Mahajan
Entity provider selection confusion attacks in JAX-RS applications
Entity provider selection confusion attacks in JAX-RS applications
Mikhail Egorov
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Lior Rotkovitch
Intro to Php Security
Intro to Php Security
Dave Ross
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
Mohammed ALDOUB
Unusual Web Bugs
Unusual Web Bugs
amiable_indian
Recommended
OWASP Pune Chapter : Dive Into The Profound Web Attacks
OWASP Pune Chapter : Dive Into The Profound Web Attacks
Narendra Bhati
Club hack 2011 precon ctf walkthrough
Club hack 2011 precon ctf walkthrough
n|u - The Open Security Community
Secure Programming In Php
Secure Programming In Php
Akash Mahajan
Entity provider selection confusion attacks in JAX-RS applications
Entity provider selection confusion attacks in JAX-RS applications
Mikhail Egorov
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Lior Rotkovitch
Intro to Php Security
Intro to Php Security
Dave Ross
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
Mohammed ALDOUB
Unusual Web Bugs
Unusual Web Bugs
amiable_indian
Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)
Susam Pal
Neat tricks to bypass CSRF-protection
Neat tricks to bypass CSRF-protection
Mikhail Egorov
Security In PHP Applications
Security In PHP Applications
Aditya Mooley
Same Origin Policy Weaknesses
Same Origin Policy Weaknesses
kuza55
OAuth Hacks A gentle introduction to OAuth 2 and Apache Oltu
OAuth Hacks A gentle introduction to OAuth 2 and Apache Oltu
Antonio Sanso
Static Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without Fighting
Rob Ragan
Django (Web Applications that are Secure by Default )