|
You are here |
blog.takemyhand.xyz | ||
| | | | |
blog.plataformatec.com.br
|
|
| | | | | A security bug (CVE-2015-8314) has been reported in Devise's remember me system. Devise implements the "Remember me" functionality by using cookies. While this functionality works across multiple devices, Devise ended-up generating the same cookie for all devices. Consequently, if a malicious user was able to steal a remember me cookie, the cookie could be used | |
| | | | |
timtech.blog
|
|
| | | | | Fun with Cross-Site Request Forgery (CSRF) in a creative Web Timing Attack scenario, highlighting the risks inherent to SameSite=None session cookies. | |
| | | | |
blog.doyensec.com
|
|
| | | | | Exploiting Client-Side Path Traversal to Perform Cross-Site Request Forgery - Introducing CSPT2CSRF | |
| | | | |
martinschoombee.com
|
|
| | | As part of the authorization code flow you'll receive two very important tokens. The access token is what you will use for authentication when sending API requests, but access tokens are only valid for a certain amount of time. How long the access token is valid for usually depends on vendor, and it could be... | ||