- Sort Score
- Num 10 results
- Language All
Results 21 - 30 of 1,064 for contexto (0.05 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
src/test/java/jcifs/internal/smb2/nego/Smb2NegotiateResponseInputValidationTest.java
// At offset 128 + 64 (header start), set context with excessive data length int contextPos = 192; SMBUtil.writeInt2(1, buffer, contextPos); // Context type SMBUtil.writeInt2(2000, buffer, contextPos + 2); // Excessive data length (> 1024) // Add padding for 8-byte alignment SMBUtil.writeInt2(0, buffer, contextPos + 4); // ReservedCreated: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 15.8K bytes - Click Count (0) -
docs/tr/docs/tutorial/dependencies/dependencies-with-yield.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 13.4K bytes - Click Count (0) -
tensorflow/c/eager/c_api.cc
} namespace tensorflow { namespace { class CustomDeviceAPI : public tensorflow::CustomDevice { public: CustomDeviceAPI(TFE_Context* context, TFE_CustomDevice device, void* info, string name) : context_(context), device_(device), info_(info), name_(name) {} ~CustomDeviceAPI() override { device_.delete_device(info_); } const string& name() override { return name_; }Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Fri Nov 07 05:55:21 GMT 2025 - 43.9K bytes - Click Count (0) -
.github/workflows/contributor-pr.yml
with: distribution: temurin java-version: 17 - id: determine-sys-prop-args uses: actions/github-script@v8 with: script: | if (context.payload.pull_request && context.payload.pull_request.head.repo.fork) { core.setOutput('sys-prop-args', '-DagreePublicBuildScanTermOfService=yes -Ddevelocity.edge.discovery=false -DcacheNode=us --scan') } else {Created: Wed Apr 01 11:36:16 GMT 2026 - Last Modified: Mon Mar 23 22:06:44 GMT 2026 - 5K bytes - Click Count (0) -
docs/fr/docs/advanced/events.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 9.1K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
# Strict Content-Type Checking { #strict-content-type-checking } By default, **FastAPI** uses strict `Content-Type` header checking for JSON request bodies, this means that JSON requests **must** include a valid `Content-Type` header (e.g. `application/json`) in order for the body to be parsed as JSON. ## CSRF Risk { #csrf-risk } This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
# Strikte Content-Type-Prüfung { #strict-content-type-checking } Standardmäßig verwendet **FastAPI** eine strikte Prüfung des `Content-Type`-Headers für JSON-Requestbodys. Das bedeutet, dass JSON-Requests einen gültigen `Content-Type`-Header (z. B. `application/json`) enthalten MÜSSEN, damit der Body als JSON geparst wird. ## CSRF-Risiko { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/ko/docs/advanced/strict-content-type.md
# 엄격한 Content-Type 확인 { #strict-content-type-checking } 기본적으로 **FastAPI**는 JSON 요청 본문에 대해 엄격한 `Content-Type` 헤더 검사를 사용합니다. 이는 JSON 요청의 본문을 JSON으로 파싱하려면 유효한 `Content-Type` 헤더(예: `application/json`)를 반드시 포함해야 함을 의미합니다. ## CSRF 위험 { #csrf-risk } 이 기본 동작은 매우 특정한 시나리오에서 **Cross-Site Request Forgery (CSRF)** 공격의 한 유형에 대한 보호를 제공합니다. 이러한 공격은 브라우저가 다음과 같은 경우 CORS 사전 요청(preflight) 검사를 수행하지 않고 스크립트가 요청을 보내도록 허용한다는 점을 악용합니다:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:56:39 GMT 2026 - 4K bytes - Click Count (0) -
docs/ja/docs/advanced/strict-content-type.md
# Content-Type の厳格チェック { #strict-content-type-checking } 既定では、FastAPI は JSON リクエストボディに対して厳格な `Content-Type` ヘッダーのチェックを行います。つまり、JSON のリクエストを JSON として解析するには、有効な `Content-Type` ヘッダー(例: `application/json`)を必ず含める必要があります。 ## CSRF のリスク { #csrf-risk } この既定の挙動は、ある特定の状況における Cross-Site Request Forgery(CSRF)攻撃の一種に対する保護を提供します。 これらの攻撃は、次の条件を満たすときにブラウザが CORS のプリフライトチェックを行わずにスクリプトからリクエストを送信できる事実を悪用します。 - `Content-Type` ヘッダーがない(例: `Blob` をボディにして `fetch()` を使う)Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:55:22 GMT 2026 - 4.4K bytes - Click Count (0) -
docs/fr/docs/advanced/strict-content-type.md
# Vérifier strictement le Content-Type { #strict-content-type-checking } Par défaut, FastAPI applique une vérification stricte de l’en-tête `Content-Type` pour les corps de requêtes JSON ; cela signifie que les requêtes JSON doivent inclure un en-tête `Content-Type` valide (par ex. `application/json`) pour que le corps soit analysé comme JSON. ## Risque CSRF { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:33:45 GMT 2026 - 3.9K bytes - Click Count (0)