Guzzle PHP 6.5 DocumentationInstallation Bleeding edge License Contributing Guidelines Running the tests Reporting a security vulnerability Quickstart Making a Request Creating a Client Sending Requests Async Requests Concurrent requests handlers. Reporting a security vulnerability We want to ensure that Guzzle is a secure HTTP client library for everyone. If you've discovered a security vulnerability in Guzzle, we appreciate your help responsible manner [http://en.wikipedia.org/wiki/Responsible_disclosure]. Publicly disclosing a vulnerability can put the entire community at risk. If you've discovered a security concern, please email us0 码力 | 65 页 | 311.42 KB | 11 月前3
Guzzle PHP 7.0 DocumentationInstallation Bleeding edge License Contributing Guidelines Running the tests Reporting a security vulnerability Quickstart Making a Request Creating a Client Sending Requests Async Requests Concurrent requests handlers. Reporting a security vulnerability We want to ensure that Guzzle is a secure HTTP client library for everyone. If you've discovered a security vulnerability in Guzzle, we appreciate your help responsible manner [https://en.wikipedia.org/wiki/Responsible_disclosure]. Publicly disclosing a vulnerability can put the entire community at risk. If you've discovered a security concern, please email us0 码力 | 64 页 | 310.93 KB | 11 月前3
Guzzle PHP v5 DocumentationInstallation Bleeding edge License Contributing Guidelines Running the tests Reporting a security vulnerability Quickstart Making a Request Creating a Client Sending Requests Async Requests Concurrent requests handlers. Reporting a security vulnerability We want to ensure that Guzzle is a secure HTTP client library for everyone. If you've discovered a security vulnerability in Guzzle, we appreciate your help responsible manner [http://en.wikipedia.org/wiki/Responsible_disclosure]. Publicly disclosing a vulnerability can put the entire community at risk. If you've discovered a security concern, please email us0 码力 | 62 页 | 309.78 KB | 11 月前3
Guzzle PHP 5.3 Documentation}); User guide Overview Requirements Installation License Contributing Reporting a security vulnerability Quickstart Make a Request Using Responses Query String Parameters Uploading Data Cookies Redirects handlers. Reporting a security vulnerability We want to ensure that Guzzle is a secure HTTP client library for everyone. If you’ve discovered a security vulnerability in Guzzle, we appreciate your help responsible manner [http://en.wikipedia.org/wiki/Responsible_disclosure]. Publicly disclosing a vulnerability can put the entire community at risk. If you’ve discovered a security concern, please email us0 码力 | 72 页 | 312.62 KB | 11 月前3
Guzzle PHP v5 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.5 Reporting a security vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2 Quickstart . . . . . . . newer in order to perform integration tests on Guzzle’s HTTP handlers. Reporting a security vulnerability We want to ensure that Guzzle is a secure HTTP client library for everyone. If you’ve discovered we appreciate your help in disclosing it to us in a responsible manner. Publicly disclosing a vulnerability can put the entire community at risk. If you’ve discovered a security concern, please email us0 码力 | 49 页 | 231.08 KB | 11 月前3
Guzzle PHP 7.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.5 Reporting a security vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2 Quickstart . . . . . . . in order to perform integration tests on Guzzle’s HTTP handlers. 1.1.5 Reporting a security vulnerability We want to ensure that Guzzle is a secure HTTP client library for everyone. If you’ve discovered we appreciate your help in disclosing it to us in a responsible manner. Publicly disclosing a vulnerability can put the entire community at risk. If you’ve discovered a security concern, please email us0 码力 | 50 页 | 235.39 KB | 11 月前3
Guzzle PHP 6.5 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.5 Reporting a security vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2 Quickstart . . . . . . . in order to perform integration tests on Guzzle’s HTTP handlers. 1.1.5 Reporting a security vulnerability We want to ensure that Guzzle is a secure HTTP client library for everyone. If you’ve discovered we appreciate your help in disclosing it to us in a responsible manner. Publicly disclosing a vulnerability can put the entire community at risk. If you’ve discovered a security concern, please email us0 码力 | 50 页 | 237.04 KB | 11 月前3
Guzzle PHP 5.3 Documentationin order to perform integration tests on Guzzle’s HTTP handlers. 1.1.5 Reporting a security vulnerability We want to ensure that Guzzle is a secure HTTP client library for everyone. If you’ve discovered we appreciate your help in disclosing it to us in a responsible manner. Publicly disclosing a vulnerability can put the entire community at risk. If you’ve discovered a security concern, please email us priority, and work to address any issues that arise as quickly as possible. After a security vulnerability has been corrected, a security hotfix release will be deployed as soon as possible. 1.2 Quickstart0 码力 | 63 页 | 275.75 KB | 11 月前3
CakePHP Cookbook 3.x
the CakePHP core team on a private mailing list. For each report, we try to first confirm the vulnerability. Once confirmed, the CakePHP team will take the following actions: Acknowledge to the reporter issue confidential until we announce it. Get a fix/patch prepared. Prepare a post describing the vulnerability, and the possible exploits. Release new versions of all affected versions. Prominently feature [https://en.wikipedia.org/wiki/Cross-site_request_forgery] or Cross Site Request Forgery is a common vulnerability in web applications. It allows an attacker to capture and replay a previous request, and sometimes0 码力 | 1244 页 | 1.05 MB | 1 年前3
CakePHP Cookbook 3.x
the CakePHP core team on a private mailing list. For each report, we try to first confirm the vulnerability. Once confirmed, the CakePHP team will take the following actions: • Acknowledge to the reporter Cookbook Documentation, Release 3.10 • Get a fix/patch prepared. • Prepare a post describing the vulnerability, and the possible exploits. • Release new versions of all affected versions. • Prominently feature Component you get protection against attacks. CSRF123 or Cross Site Request Forgery is a common vulnerability in web applications. It allows an attacker to capture and replay a previous request, and sometimes0 码力 | 967 页 | 2.80 MB | 1 年前3
共 17 条
- 1
- 2













