Menu

Close
  • BIG DATA
  • BACK-END
  • FRONT-END
  • AGILITE
  • DEVOPS
  • CLOUD
Subscribe
Ippon | Experts en Innovation Java , DevOps, Big Data, Front-end, & Back-end Menu

Philippe_CERY

14 posts
Page 1 of 3 Older Posts →

Coding Dojo équipe @pcery

Ce Mardi 4 Mars 2014 avait lieu le Coding Dojo de mon équipe. Voici un petit résumé. Déroulement de la journée L’objectif principal de cette »

Philippe_CERY on Front-End, Culture 11 March 2014

OWASP Top 10 - A10 Unvalidated Redirects and Forwards

Description If a user is redirected or forwarded to a page defined by an unverified entry, the target URL can be manipulated by an attacker. This »

Philippe_CERY on Front-End, Back-End 29 January 2014

OWASP Top 10 - A9 Using Components with Known Vulnerabilities

Description Known software vulnerabilities are available to everyone on the Internet. If an attacker knows which components you use, he can retrieve these vulnerabilities and find »

Philippe_CERY on Front-End, Back-End 28 January 2014

OWASP Top 10 - A8 Cross-Site Request Forgery (CSRF)

Description An attacker sends a request to a website you are authenticated on to execute an operation without your formal approval. Attackers usually use XSS [https: »

Philippe_CERY on Front-End, Back-End 14 January 2014

OWASP Top 10 - A7 Missing Function Level Access Control

Description In a web application with different user roles, authentication is not enough. Each request must be controlled against user’s role to ensure the user »

Philippe_CERY on Front-End, Back-End 09 December 2013
Page 1 of 3 Older Posts →
Ippon | Experts en Innovation Java , DevOps, Big Data, Front-end, & Back-end © 2025
Proudly published with Ghost