• In many cases CSRF and XSS will help to do so.

    许多情况下CSRFXSS有助于这样

    youdao

  • Some variants use CSRF to pre-load data in forms, some don't.

    一些变种使用CSRF预先加载数据表单有些没有

    youdao

  • Requests can be crafted which will circumvent the CSRF protection entirely.

    定制的请求可以完全绕开CSRF保护

    youdao

  • In a CSRF attack, your users can easily become unsuspecting accomplices.

    CSRF攻击中,用户可以轻易地成为预料不到的帮凶

    youdao

  • The sequence of requests and responses during a CSRF attack is illustrated in Figure 1.

    CSRF攻击过程中的请求响应序列如 图 1 所

    youdao

  • Finally, make sure your PHP code is resilient to XSS attacks, form spoofs, and CSRF attacks.

    最后确保PHP代码可以抵抗XSS攻击表单欺骗CSRF攻击。

    youdao

  • In CSRF attacks, unauthorized commands are transmitted from a user that the Web site trusts.

    CSRF攻击中,Web站点信任用户传播未经授权命令

    youdao

  • CSRF attacks are often in the form of tags because the browser unwittingly calls the URL to get the image.

    CSRF攻击通常是以标记形式出现因为浏览器将在不知情的情况下调用url获得图像

    youdao

  • CORS does not prevent CSRF, all it does is relax the restrictions enforced by the Same Origin Policy.

    CORS不会阻止CSRF只是放松同源政策强制执行的限制

    youdao

  • To guard yourself against CSRF, use the one-use token approach you use in your habit of verifying form posts.

    为了保护免受CSRF攻击,需要使用检验表单post时使用的一次性标记方法

    youdao

  • A mashup application or page must address CSRF, Ajax vulnerabilities, XSS, and other potential security weaknesses.

    mashup应用程序页面必须解决CSRFAjax漏洞XSS其他潜在安全漏洞

    youdao

  • CSRF (Cross Site Request Fogery) allows attackers to bypass cookie based authentication. I blogged about it a while ago.

    个是CSRF (CrossSiteRequest Forgery,跨站点伪造请求攻击),允许攻击者绕过基于cookie身份认证,前些天曾在Blog上介绍过这种攻击。

    youdao

  • Whereas XSS attacks exploit the trust a user has in a Web site, CSRF attacks exploit the trust a Web site has in a user.

    XSS攻击利用用户网站信任CSRF 攻击利用的是网站对用户的信任。

    youdao

  • Many intrusion vulnerabilities such as SQL injection, CSRF, and XSS are preventable using a comprehensive input-validation framework.

    如果使用一个综合的输入验证框架许多输入漏洞SQL注入CSRFXSS都是可以避免的。

    youdao

  • Every edit operation must be accompanied by a token, which ensures the validity of the user request and protects against CSRF attacks.

    每个编辑操作必须伴有一个令牌可确保用户请求有效性抵御CSRF攻击。

    youdao

  • During a CSRF attack, requests originate from an intruder site and are transmitted through an authenticated browser page to the server.

    CSRF攻击过程中,请求来自入侵者站点,然后通过一个经过验证浏览器页面传输服务器

    youdao

  • You can typically prevent CSRF attacks by requiring that a unique token or cookie be passed with every request, which can be done with Dojo.

    通常可以通过要求每个请求发送时传递一个惟一的令牌cookie来阻止CSRF攻击可以通过Dojo来完成

    youdao

  • The browser would send a request to the server that would store the user's session identifier, CSRF token, etc. in our support database.

    浏览器发送一个请求服务器存储用户会话标识符CSRF令牌我们支持数据库

    youdao

  • CSRF attacks originate from malicious code from an intruder site that tricks a browser into transmitting unprovoked requests to a trusted site.

    CSRF攻击入侵站点恶意代码发起代码欺骗浏览器,使其将无关的请求传输受信任站点。

    youdao

  • The server will assume that any requests that lack the correct value in the Request-Token header are CSRF attack attempts and will reject them.

    服务器假设Request - Token头部中缺乏正确任何请求都是CSRF攻击企图将拒绝它们。

    youdao

  • CSRF attacks depend on a server assuming that all requests transmitted from the browser that originally started an authenticated session are valid.

    CSRF攻击依赖这样一个服务器假设:来自启动验证会话浏览器所有请求都是有效的。

    youdao

  • As a countermeasure, make change-password forms safe against CSRF, of course. And require the user to enter the old password when changing it.

    对策是修改密码的表单不能被CRSF攻击,当然改变密码的时候,需要用户输入密码。

    youdao

  • During a CSRF attack, requests originate from an intruding third-party site and are passed through an authenticated browser page to the server.

    CSRF攻击过程中,请求源自入侵第三方站点通过一个已验证浏览器页面传递服务器。

    youdao

  • For example, as in a CSRF vulnerability in Google Mail. In this proof-of-concept attack, the victim would have been lured to a web site controlled by the attacker.

    例如GoogleMailCSRF漏洞这个概念验证的攻击中,受害者引诱一个攻击控制站点

    youdao

  • The browser's same-origin policy does not prevent CSRF attacks because the attack requests are transmitted to the same origin in proxy for the intruding third-party site.

    浏览器同源策略无法阻止CSRF攻击因为攻击请求传输第三方入侵站点代理相同

    youdao

  • Jacob gave examples of some of the vulnerabilities like Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), HTTP Response Splitting, Session Fixation, and SQL Injection.

    Jacob其中一些弱点给出了示例站点脚本攻击(XSS)、跨站点伪造请求(CSRF)、HTTP响应分割会话固定攻击以及SQL注入攻击等等。

    youdao

  • In addition to handling traditional threats, a mashup application or web page must address such issues as cross-site scripting (XSS) and cross-site request forgery (CSRF), among others.

    除了处理传统威胁外,混应用程序web页面必须解决站点脚本编写(XSS)跨站点请求伪造(CSRF)问题

    youdao

  • In addition to handling traditional threats, a mashup application or web page must address such issues as cross-site scripting (XSS) and cross-site request forgery (CSRF), among others.

    除了处理传统威胁外,混应用程序web页面必须解决站点脚本编写(XSS)跨站点请求伪造(CSRF)问题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定