- Sort Score
- Num 10 results
- Language All
Results 81 - 90 of 473 for bletch (0.04 seconds)
-
docs/de/docs/advanced/strict-content-type.md
Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie: * keinen `Content-Type`-Header haben (z. B. mit `fetch()` und einem `Blob`-Body) * und keine Authentifizierungsdaten senden. Diese Art von Angriff ist vor allem relevant, wenn: * die Anwendung lokal läuft (z. B. auf `localhost`) oder in einem internen Netzwerk
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/helper/ProcessHelper.java
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Nov 20 06:54:47 GMT 2025 - 10.9K bytes - Click Count (0) -
okhttp-dnsoverhttps/src/main/kotlin/okhttp3/dnsoverhttps/DnsOverHttps.kt
) { val latch = CountDownLatch(networkRequests.size) for (call in networkRequests) { call.enqueue( object : Callback { override fun onFailure( call: Call, e: IOException, ) { synchronized(failures) { failures.add(e) } latch.countDown() }Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sat May 10 11:15:14 GMT 2025 - 8.6K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/timer/LogNotificationTarget.java
for (int i = 0; i < events.size(); i += BATCH_SIZE) { final List<LogNotificationEvent> batch = events.subList(i, Math.min(i + BATCH_SIZE, events.size())); final BulkRequestBuilder bulkRequest = client.prepareBulk(); for (final LogNotificationEvent event : batch) { final Map<String, Object> source = new HashMap<>(); source.put("hostname", hostname);Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Mar 26 02:24:08 GMT 2026 - 4.5K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they: * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body) * and don't send any authentication credentials. This type of attack is mainly relevant when: * the application is running locally (e.g. on `localhost`) or in an internal network
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
docs/pt/docs/advanced/strict-content-type.md
Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando: - não têm um cabeçalho `Content-Type` (por exemplo, usando `fetch()` com um corpo `Blob`) - e não enviam nenhuma credencial de autenticação. Esse tipo de ataque é relevante principalmente quando: - a aplicação está em execução localmente (por exemplo, em `localhost`) ou em uma rede interna
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:13 GMT 2026 - 3.5K bytes - Click Count (0) -
src/test/java/org/codelibs/curl/io/IOIntegrationTest.java
// ## Act ## req.execute(response -> { threadName.set(Thread.currentThread().getName()); latch.countDown(); }, e -> { latch.countDown(); }); // ## Assert ## assertTrue("Async execution should complete within 5 seconds", latch.await(5, TimeUnit.SECONDS)); assertNotNull(threadName.get());Created: Thu Apr 02 15:34:12 GMT 2026 - Last Modified: Sat Mar 21 12:00:34 GMT 2026 - 44.1K bytes - Click Count (0) -
.github/workflows/auto-assign-pr-to-author.yml
name: 'Auto Assign PR to Author' on: pull_request: types: [opened] permissions: {} jobs: add-reviews: permissions: contents: read # for kentaro-m/auto-assign-action to fetch config file pull-requests: write # for kentaro-m/auto-assign-action to assign PR reviewers runs-on: ubuntu-latest steps:
Created: Wed Apr 01 11:36:16 GMT 2026 - Last Modified: Fri Mar 20 22:04:14 GMT 2026 - 381 bytes - Click Count (0) -
docs/fr/docs/advanced/strict-content-type.md
Ces attaques exploitent le fait que les navigateurs permettent à des scripts d’envoyer des requêtes sans effectuer de pré-vérification CORS (preflight) lorsqu’ils : * n’ont pas d’en-tête `Content-Type` (par ex. en utilisant `fetch()` avec un corps `Blob`) * et n’envoient aucune information d’authentification. Ce type d’attaque est surtout pertinent lorsque : * l’application s’exécute localement (par ex. sur `localhost`) ou sur un réseau interne
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:33:45 GMT 2026 - 3.9K bytes - Click Count (0) -
cmd/config-current.go
} else { globalHealConfig.Update(healCfg) } case config.BatchSubSys: batchCfg, err := batch.LookupConfig(s[config.BatchSubSys][config.Default]) if err != nil { errs = append(errs, fmt.Errorf("Unable to apply batch config: %w", err)) } else { globalBatchConfig.Update(batchCfg) } case config.ScannerSubSys:Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 28.5K bytes - Click Count (0)