Home
last modified time | relevance | path

Searched +full:security -(+path:inc +path:lang) -(+path:lib +path:plugins +path:lang) -(+path:lib +path:tpl +path:dokuwiki +path:lang) (Results 1 – 25 of 48) sorted by path

12

/dokuwiki/
H A DSECURITY.md1 # Security Policy
3 Security vulnerabilities can be reported for the current stable release (branch `stable`) and the `master` branch.
H A Dinstall.php135 href="https://www.dokuwiki.org/security#web_access_security"></a>
/dokuwiki/data/
H A Ddeleted.files220 data/security.png
221 data/security.xcf
/dokuwiki/data/pages/wiki/
H A Dsyntax.txt85 * For security reasons direct browsing of windows shares only works in Microsoft Internet Explorer per default (and only in the "local zone").
/dokuwiki/inc/Form/
H A DForm.php30 * @param bool $unsafe if true, then the security token is ommited
56 // add the security token by default
/dokuwiki/inc/HTTP/
H A DHeaders.php11 * Send a Content-Security-Polica Header
28 $cspheader = 'Content-Security-Policy:';
/dokuwiki/inc/Ui/
H A DAdmin.php78 * data security check
/dokuwiki/inc/
H A Dauth.php337 * security. Using the first part of the IP makes sure
370 * @param bool $secure if security is more important than keeping the old value
H A Dcommon.php122 * @param null|string $token security token or null to read it from request variable
133 msg('Security Token did not match. Possible CSRF attack.', -1);
H A Dfetch.functions.php38 // send security policy if given
H A Dform.php54 * Sets parameters and autoadds a security token. The old calling convention
/dokuwiki/lib/plugins/authad/adLDAP/
H A DadLDAP.php421 * This will throw an exception for security reasons
425 throw new adLDAPException('For security reasons you cannot access the domain administrator account details');
442 * This will throw an exception for security reasons
446 throw new adLDAPException('For security reasons you cannot access the domain administrator account details');
/dokuwiki/lib/plugins/authad/adLDAP/classes/
H A DadLDAPGroups.php548 * Returns a complete list of security groups in AD
578 * need to search each security group to find the true primary group
/dokuwiki/lib/plugins/authad/conf/
H A Dmetadata.php13 $meta['debug'] = array('onoff','_caution' => 'security');
/dokuwiki/lib/plugins/authldap/conf/
H A Dmetadata.php22 $meta['debug'] = array('onoff','_caution' => 'security');
/dokuwiki/lib/plugins/authpdo/conf/
H A Dmetadata.php9 $meta['debug'] = array('onoff', '_caution' => 'security');
/dokuwiki/lib/plugins/config/core/Setting/
H A DSetting.php23 protected static $validCautions = ['warning', 'danger', 'security'];
/dokuwiki/lib/plugins/config/settings/
H A Dconfig.metadata.php56 * '_caution' - no value (default) or 'warning', 'danger', 'security'. display an alert along with the setting
98 $meta['allowdebug'] = ['onoff', '_caution' => 'security'];
105 $meta['fullpath'] = ['onoff', '_caution' => 'security'];
178 $meta['remote'] = ['onoff', '_caution' => 'security'];
180 $meta['remotecors'] = ['string', '_caution' => 'security'];
187 $meta['iexssprotect'] = ['onoff', '_caution' => 'security'];
/dokuwiki/lib/plugins/extension/
H A Daction.php65 echo 'Security Token did not match. Possible CSRF attack.';
/dokuwiki/lib/plugins/extension/helper/
H A Dextension.php453 * Get the text of the security warning if there is any
455 * @return string|bool The security warning if there is any, false otherwise
464 * Get the text of the security issue if there is any
466 * @return string|bool The security issue if there is any, false otherwise
/dokuwiki/lib/scripts/
H A Dbehaviour.js215 * avoids overeager security bans (see #3363)
220 if (sessionStorage.getItem('dw-security-check:' + DOKU_BASE)) {
230 sessionStorage.setItem('dw-security-check:' + DOKU_BASE, true);
/dokuwiki/lib/tpl/dokuwiki/css/
H A D_admin.less65 /* data directory security check */
/dokuwiki/vendor/composer/
H A Dinstalled.json247 "email": "security@paragonie.com",
315 "email": "security@paragonie.com",
417 "security",
/dokuwiki/vendor/geshi/geshi/
H A DCHANGELOG880 - Fixed security hole in contrib/example.php - able to view any file if source
/dokuwiki/vendor/geshi/geshi/src/
H A Dgeshi.php54 // Define if GeSHi should be paranoid about security
56 /** Tells GeSHi to be paranoid about security settings */
697 //Security Fix to prevent external directories using fopen wrappers.
707 //Security Fix to prevent external directories using fopen wrappers.
711 //Security Fix to prevent external directories using fopen wrappers.
715 //Security Fix to prevent external directories using fopen wrappers.
1891 * being used (it has a security hole in PHP4 that has not been patched).

12