Examples of using Request forgery in English and their translations into Russian
{-}
-
Official
-
Colloquial
Cross-site request forgery(CSRF)- $300;
DSA-1553-1 ikiwiki-- cross-site request forgery.
A cross-site request forgery vulnerability was discovered in the web interface.
Prevent cross-site request forgery added.
Richard Mansfield discovered that the management of institutions was prone to cross-site request forgery.
Ronni Skansing discovered a server-side request forgery(SSRF) vulnerability.
Cross site request forgery enabled an attacker to perform various actions on behalf of a logged in user.
DSA-2510-1 extplorer-- Cross-site request forgery.
Cross-site scripting, cross-site request forgery, SQL injections, missing input sanitising.
This is possible regardless of the Django plugin to prevent cross site request forgery being enabled.
Session hijack and cross-site request forgery vulnerabilities exist in the commenting and the community script.
The setup. php script shipped with phpMyAdmin may unserialize untrusted data,allowing for cross site request forgery.
Peleus Uhley discovered a cross-site request forgery risk in the plugin code.
Cross site request forgery allowed remote attackers to create a new database, but not perform any other action on it.
The third party site may then execute a cross-site request forgery attack against the submitted form.
It was discovered that horde3, the horde web application framework,is prone to a cross-site scripting attack and a cross-site request forgery.
Multiple forms lacked protection against cross-site request forgery attacks, therefore making them vulnerable.
They would allow remote attackers to force password resets, andperform various cross-site scripting and cross-site request forgery attacks.
David Remahl discovered that mediawiki1.7is prone to a cross-site request forgery vulnerability in the Special: Import feature.
The Study into Cross-Site Request Forgery Attacks within the Framework of Analysis of Software Vulnerabilities Proceedings of the Institute for System Programming.
Our testers verify software vulnerability to: XSS, Code injections(SQL, PHP etc.),XSRF/ CSRF(Request Forgery), Authorization Bypass.
Ben Bidner reported a server side request forgery(SSRF) in the core HTTP layer which unsufficiently blocked the loopback IP address space.
John Leitch has discovered a vulnerability in eXtplorer, a very feature richweb server file manager, which can be exploited by malicious people to conduct cross-site request forgery attacks.
For a cross-site request forgery(CSRF), use a proper CSRF case when a third party causes the logged in victim to perform an action.
Recommendations regarding the protection of web applications against cross-site request forgery attack for developers planning to certify their software are formulated.
Forms are also a relatively secure way of sharing data with the server,as they allow us to send data in POST requests with cross-site request forgery protection.
Multiple vulnerabilities have been discovered in Drupal, a fully-featured content management framework:Cross-site request forgery, insecure pseudo random number generation, code execution, incorrect security token validation and cross-site scripting.
Multiple memory safety errors, use-after-free vulnerabilities, missing permission checks, incorrect memory handling and other implementation errors may lead to the execution of arbitrary code, privilege escalation,information disclosure or cross-site request forgery.
They allowed remote attackers toperform SQL injections and various Cross-Side Scripting(XSS) and Server-Side Request Forgery(SSRF) attacks, as well as bypass some access restrictions.
The results of experimental studies have shown that most developers do not pay enough attention to protection from cross-site request forgery attack- 7 out of 10 web applications tested have been vulnerable to this type of attack.