- Sort Score
- Num 10 results
- Language All
Results 111 - 120 of 156 for fetch (0.12 seconds)
-
docs/uk/docs/advanced/strict-content-type.md
Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони: * не мають заголовка `Content-Type` (наприклад, використовуючи `fetch()` з тілом типу `Blob`) * і не надсилають жодних облікових даних автентифікації. Такий тип атаки головним чином актуальний, коли: * застосунок працює локально (наприклад, на `localhost`) або у внутрішній мережі
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:25:54 GMT 2026 - 5.5K bytes - Click Count (0) -
cmd/utils.go
req, err = http.NewRequestWithContext(ctx, http.MethodGet, u.String(), nil) if err != nil { return "", fmt.Errorf("new request err (/ldap): %v", err) } _, err = dexClient.Do(req) // fmt.Printf("Fetch LDAP login page: %#v %#v\n", resp, err) if err != nil { return "", fmt.Errorf("request err: %v", err) } // { // bodyBuf, err := io.ReadAll(resp.Body) // if err != nil {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 33K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie: * keinen `Content-Type`-Header haben (z. B. mit `fetch()` und einem `Blob`-Body) * und keine Authentifizierungsdaten senden. Diese Art von Angriff ist vor allem relevant, wenn: * die Anwendung lokal läuft (z. B. auf `localhost`) oder in einem internen Netzwerk
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/pt/docs/advanced/strict-content-type.md
Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando: - não têm um cabeçalho `Content-Type` (por exemplo, usando `fetch()` com um corpo `Blob`) - e não enviam nenhuma credencial de autenticação. Esse tipo de ataque é relevante principalmente quando: - a aplicação está em execução localmente (por exemplo, em `localhost`) ou em uma rede interna
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:13 GMT 2026 - 3.5K bytes - Click Count (0) -
docs/fr/docs/advanced/strict-content-type.md
Ces attaques exploitent le fait que les navigateurs permettent à des scripts d’envoyer des requêtes sans effectuer de pré-vérification CORS (preflight) lorsqu’ils : * n’ont pas d’en-tête `Content-Type` (par ex. en utilisant `fetch()` avec un corps `Blob`) * et n’envoient aucune information d’authentification. Ce type d’attaque est surtout pertinent lorsque : * l’application s’exécute localement (par ex. sur `localhost`) ou sur un réseau interne
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:33:45 GMT 2026 - 3.9K bytes - Click Count (0) -
src/archive/tar/reader.go
// to store the rest of the sparse map. // // The Header.Size does not reflect the size of any extended headers used. // Thus, this function will read from the raw io.Reader to fetch extra headers. // This method mutates blk in the process. func (tr *Reader) readOldGNUSparseMap(hdr *Header, blk *block) (sparseDatas, error) { // Make sure that the input format is GNU.
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Tue Oct 07 19:46:36 GMT 2025 - 26.9K bytes - Click Count (0) -
cmd/metrics-v2.go
mg := &MetricsGroupV2{ cacheInterval: 1 * time.Minute, metricsGroupOpts: opts, } mg.RegisterRead(func(ctx context.Context) (metrics []MetricV2) { objLayer := newObjectLayerFn() // Fetch disk space info, ignore errors metrics = make([]MetricV2, 0, 10) storageInfo := objLayer.StorageInfo(ctx, true) onlineDrives, offlineDrives := getOnlineOfflineDisksStats(storageInfo.Disks)Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 133.6K bytes - Click Count (0) -
docs/ko/docs/advanced/strict-content-type.md
이 기본 동작은 매우 특정한 시나리오에서 **Cross-Site Request Forgery (CSRF)** 공격의 한 유형에 대한 보호를 제공합니다. 이러한 공격은 브라우저가 다음과 같은 경우 CORS 사전 요청(preflight) 검사를 수행하지 않고 스크립트가 요청을 보내도록 허용한다는 점을 악용합니다: - `Content-Type` 헤더가 없음(예: `Blob` 본문과 함께 `fetch()` 사용) - 그리고 어떠한 인증 자격 증명도 보내지 않음 이 유형의 공격은 주로 다음과 같은 경우에 관련이 있습니다: - 애플리케이션이 로컬(예: `localhost`) 또는 내부 네트워크에서 실행 중이고 - 애플리케이션에 인증이 없어 같은 네트워크에서 오는 모든 요청을 신뢰한다고 가정하는 경우 ## 공격 예시 { #example-attack }
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:56:39 GMT 2026 - 4K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.4.md
* Add get/delete cluster, delete context to kubectl config ([#29821](https://github.com/kubernetes/kubernetes/pull/29821), [@alexbrand](https://github.com/alexbrand)) * rkt: Force `rkt fetch` to fetch from remote to conform the image pull policy. ([#31378](https://github.com/kubernetes/kubernetes/pull/31378), [@yifan-gu](https://github.com/yifan-gu))
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 133.5K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.5.md
* Add get/delete cluster, delete context to kubectl config ([#29821](https://github.com/kubernetes/kubernetes/pull/29821), [@alexbrand](https://github.com/alexbrand)) * rkt: Force `rkt fetch` to fetch from remote to conform the image pull policy. ([#31378](https://github.com/kubernetes/kubernetes/pull/31378), [@yifan-gu](https://github.com/yifan-gu))
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 136.4K bytes - Click Count (0)