Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 81 - 90 of 169 for Cors (0.02 seconds)

  1. docs/tr/docs/advanced/strict-content-type.md

    ## CSRF Riski { #csrf-risk }
    
    Bu varsayılan davranış, çok belirli bir senaryoda bir sınıf Cross-Site Request Forgery (CSRF) saldırılarına karşı koruma sağlar.
    
    Bu saldırılar, tarayıcıların aşağıdaki durumlarda herhangi bir CORS preflight kontrolü yapmadan script’lerin request göndermesine izin vermesinden faydalanır:
    
    - bir Content-Type header’ı yoksa (örn. body olarak Blob ile fetch() kullanıldığında)
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:51:35 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  2. docs/uk/docs/advanced/strict-content-type.md

    Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії.
    
    Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони:
    
    * не мають заголовка `Content-Type` (наприклад, використовуючи `fetch()` з тілом типу `Blob`)
    * і не надсилають жодних облікових даних автентифікації.
    
    Такий тип атаки головним чином актуальний, коли:
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:25:54 GMT 2026
    - 5.5K bytes
    - Click Count (0)
  3. docs/de/docs/advanced/strict-content-type.md

    Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario.
    
    Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie:
    
    * keinen `Content-Type`-Header haben (z. B. mit `fetch()` und einem `Blob`-Body)
    * und keine Authentifizierungsdaten senden.
    
    Diese Art von Angriff ist vor allem relevant, wenn:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:48:21 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  4. docs/pt/docs/advanced/strict-content-type.md

    Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando:
    
    - não têm um cabeçalho `Content-Type` (por exemplo, usando `fetch()` com um corpo `Blob`)
    - e não enviam nenhuma credencial de autenticação.
    
    Esse tipo de ataque é relevante principalmente quando:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:13 GMT 2026
    - 3.5K bytes
    - Click Count (0)
  5. docs/fr/docs/advanced/strict-content-type.md

    Ces attaques exploitent le fait que les navigateurs permettent à des scripts d’envoyer des requêtes sans effectuer de pré-vérification CORS (preflight) lorsqu’ils :
    
    * n’ont pas d’en-tête `Content-Type` (par ex. en utilisant `fetch()` avec un corps `Blob`)
    * et n’envoient aucune information d’authentification.
    
    Ce type d’attaque est surtout pertinent lorsque :
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:33:45 GMT 2026
    - 3.9K bytes
    - Click Count (0)
  6. docs/es/docs/index.md

    * Muchas funcionalidades extra (gracias a Starlette) como:
        * **WebSockets**
        * pruebas extremadamente fáciles basadas en HTTPX y `pytest`
        * **CORS**
        * **Sesiones de Cookies**
        * ...y más.
    
    ### Despliega tu app (opcional) { #deploy-your-app-optional }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:15:55 GMT 2026
    - 22.6K bytes
    - Click Count (0)
  7. docs/pt/docs/index.md

    * Muitos recursos extras (graças ao Starlette) como:
        * **WebSockets**
        * testes extremamente fáceis baseados em HTTPX e `pytest`
        * **CORS**
        * **Cookie Sessions**
        * ...e mais.
    
    ### Implemente sua aplicação (opcional) { #deploy-your-app-optional }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:43 GMT 2026
    - 22.7K bytes
    - Click Count (0)
  8. src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java

        /** The key of the configuration. e.g. * */
        String API_CORS_ALLOW_ORIGIN = "api.cors.allow.origin";
    
        /** The key of the configuration. e.g. GET, POST, OPTIONS, DELETE, PUT */
        String API_CORS_ALLOW_METHODS = "api.cors.allow.methods";
    
        /** The key of the configuration. e.g. 3600 */
        String API_CORS_MAX_AGE = "api.cors.max.age";
    
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sat Mar 28 06:59:19 GMT 2026
    - 576.9K bytes
    - Click Count (2)
  9. docs/fr/docs/index.md

    * De nombreuses fonctionnalités supplémentaires (grâce à Starlette) comme :
        * **WebSockets**
        * des tests extrêmement faciles basés sur HTTPX et `pytest`
        * **CORS**
        * **Cookie Sessions**
        * ... et plus encore.
    
    ### Déployer votre application (optionnel) { #deploy-your-app-optional }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:37:13 GMT 2026
    - 23.8K bytes
    - Click Count (0)
  10. src/test/java/org/codelibs/fess/cors/DefaultCorsHandlerTest.java

     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
     * either express or implied. See the License for the specific language
     * governing permissions and limitations under the License.
     */
    package org.codelibs.fess.cors;
    
    import org.codelibs.fess.unit.UnitFessTestCase;
    import org.junit.jupiter.api.Test;
    import org.junit.jupiter.api.TestInfo;
    
    public class DefaultCorsHandlerTest extends UnitFessTestCase {
    
        @Override
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Wed Jan 14 14:29:07 GMT 2026
    - 1.9K bytes
    - Click Count (0)
Back to Top