- Sort Score
- Num 10 results
- Language All
Results 81 - 90 of 169 for Cors (0.02 seconds)
-
docs/tr/docs/advanced/strict-content-type.md
## CSRF Riski { #csrf-risk } Bu varsayılan davranış, çok belirli bir senaryoda bir sınıf Cross-Site Request Forgery (CSRF) saldırılarına karşı koruma sağlar. Bu saldırılar, tarayıcıların aşağıdaki durumlarda herhangi bir CORS preflight kontrolü yapmadan script’lerin request göndermesine izin vermesinden faydalanır: - bir Content-Type header’ı yoksa (örn. body olarak Blob ile fetch() kullanıldığında)Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:51:35 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/uk/docs/advanced/strict-content-type.md
Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії. Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони: * не мають заголовка `Content-Type` (наприклад, використовуючи `fetch()` з тілом типу `Blob`) * і не надсилають жодних облікових даних автентифікації. Такий тип атаки головним чином актуальний, коли:
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:25:54 GMT 2026 - 5.5K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario. Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie: * keinen `Content-Type`-Header haben (z. B. mit `fetch()` und einem `Blob`-Body) * und keine Authentifizierungsdaten senden. Diese Art von Angriff ist vor allem relevant, wenn:
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/pt/docs/advanced/strict-content-type.md
Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando: - não têm um cabeçalho `Content-Type` (por exemplo, usando `fetch()` com um corpo `Blob`) - e não enviam nenhuma credencial de autenticação. Esse tipo de ataque é relevante principalmente quando:
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:13 GMT 2026 - 3.5K bytes - Click Count (0) -
docs/fr/docs/advanced/strict-content-type.md
Ces attaques exploitent le fait que les navigateurs permettent à des scripts d’envoyer des requêtes sans effectuer de pré-vérification CORS (preflight) lorsqu’ils : * n’ont pas d’en-tête `Content-Type` (par ex. en utilisant `fetch()` avec un corps `Blob`) * et n’envoient aucune information d’authentification. Ce type d’attaque est surtout pertinent lorsque :
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:33:45 GMT 2026 - 3.9K bytes - Click Count (0) -
docs/es/docs/index.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 22.6K bytes - Click Count (0) -
docs/pt/docs/index.md
* Muitos recursos extras (graças ao Starlette) como: * **WebSockets** * testes extremamente fáceis baseados em HTTPX e `pytest` * **CORS** * **Cookie Sessions** * ...e mais. ### Implemente sua aplicação (opcional) { #deploy-your-app-optional }
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 22.7K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java
/** The key of the configuration. e.g. * */ String API_CORS_ALLOW_ORIGIN = "api.cors.allow.origin"; /** The key of the configuration. e.g. GET, POST, OPTIONS, DELETE, PUT */ String API_CORS_ALLOW_METHODS = "api.cors.allow.methods"; /** The key of the configuration. e.g. 3600 */ String API_CORS_MAX_AGE = "api.cors.max.age";Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 28 06:59:19 GMT 2026 - 576.9K bytes - Click Count (2) -
docs/fr/docs/index.md
* De nombreuses fonctionnalités supplémentaires (grâce à Starlette) comme : * **WebSockets** * des tests extrêmement faciles basés sur HTTPX et `pytest` * **CORS** * **Cookie Sessions** * ... et plus encore. ### Déployer votre application (optionnel) { #deploy-your-app-optional }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 23.8K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/cors/DefaultCorsHandlerTest.java
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, * either express or implied. See the License for the specific language * governing permissions and limitations under the License. */ package org.codelibs.fess.cors; import org.codelibs.fess.unit.UnitFessTestCase; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestInfo; public class DefaultCorsHandlerTest extends UnitFessTestCase { @OverrideCreated: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Wed Jan 14 14:29:07 GMT 2026 - 1.9K bytes - Click Count (0)