Searched +full:security -(+path:inc +path:lang) -(+path:lib +path:plugins +path:lang) -(+path:lib +path:tpl +path:dokuwiki +path:lang) (Results 1 – 25 of 48) sorted by path
12
/dokuwiki/ |
H A D | SECURITY.md | 1 # Security Policy 3 Security vulnerabilities can be reported for the current stable release (branch `stable`) and the `master` branch.
|
H A D | install.php | 135 href="https://www.dokuwiki.org/security#web_access_security"></a>
|
/dokuwiki/data/ |
H A D | deleted.files | 220 data/security.png 221 data/security.xcf
|
/dokuwiki/data/pages/wiki/ |
H A D | syntax.txt | 85 * For security reasons direct browsing of windows shares only works in Microsoft Internet Explorer per default (and only in the "local zone").
|
/dokuwiki/inc/Form/ |
H A D | Form.php | 30 * @param bool $unsafe if true, then the security token is ommited 56 // add the security token by default
|
/dokuwiki/inc/HTTP/ |
H A D | Headers.php | 11 * Send a Content-Security-Polica Header 28 $cspheader = 'Content-Security-Policy:';
|
/dokuwiki/inc/Ui/ |
H A D | Admin.php | 78 * data security check
|
/dokuwiki/inc/ |
H A D | auth.php | 337 * security. Using the first part of the IP makes sure 370 * @param bool $secure if security is more important than keeping the old value
|
H A D | common.php | 122 * @param null|string $token security token or null to read it from request variable 133 msg('Security Token did not match. Possible CSRF attack.', -1);
|
H A D | fetch.functions.php | 38 // send security policy if given
|
H A D | form.php | 54 * Sets parameters and autoadds a security token. The old calling convention
|
/dokuwiki/lib/plugins/authad/adLDAP/ |
H A D | adLDAP.php | 421 * This will throw an exception for security reasons 425 throw new adLDAPException('For security reasons you cannot access the domain administrator account details'); 442 * This will throw an exception for security reasons 446 throw new adLDAPException('For security reasons you cannot access the domain administrator account details');
|
/dokuwiki/lib/plugins/authad/adLDAP/classes/ |
H A D | adLDAPGroups.php | 548 * Returns a complete list of security groups in AD 578 * need to search each security group to find the true primary group
|
/dokuwiki/lib/plugins/authad/conf/ |
H A D | metadata.php | 13 $meta['debug'] = array('onoff','_caution' => 'security');
|
/dokuwiki/lib/plugins/authldap/conf/ |
H A D | metadata.php | 22 $meta['debug'] = array('onoff','_caution' => 'security');
|
/dokuwiki/lib/plugins/authpdo/conf/ |
H A D | metadata.php | 9 $meta['debug'] = array('onoff', '_caution' => 'security');
|
/dokuwiki/lib/plugins/config/core/Setting/ |
H A D | Setting.php | 23 protected static $validCautions = ['warning', 'danger', 'security'];
|
/dokuwiki/lib/plugins/config/settings/ |
H A D | config.metadata.php | 56 * '_caution' - no value (default) or 'warning', 'danger', 'security'. display an alert along with the setting 98 $meta['allowdebug'] = ['onoff', '_caution' => 'security']; 105 $meta['fullpath'] = ['onoff', '_caution' => 'security']; 178 $meta['remote'] = ['onoff', '_caution' => 'security']; 180 $meta['remotecors'] = ['string', '_caution' => 'security']; 187 $meta['iexssprotect'] = ['onoff', '_caution' => 'security'];
|
/dokuwiki/lib/plugins/extension/ |
H A D | action.php | 65 echo 'Security Token did not match. Possible CSRF attack.';
|
/dokuwiki/lib/plugins/extension/helper/ |
H A D | extension.php | 453 * Get the text of the security warning if there is any 455 * @return string|bool The security warning if there is any, false otherwise 464 * Get the text of the security issue if there is any 466 * @return string|bool The security issue if there is any, false otherwise
|
/dokuwiki/lib/scripts/ |
H A D | behaviour.js | 215 * avoids overeager security bans (see #3363) 220 if (sessionStorage.getItem('dw-security-check:' + DOKU_BASE)) { 230 sessionStorage.setItem('dw-security-check:' + DOKU_BASE, true);
|
/dokuwiki/lib/tpl/dokuwiki/css/ |
H A D | _admin.less | 65 /* data directory security check */
|
/dokuwiki/vendor/composer/ |
H A D | installed.json | 247 "email": "security@paragonie.com", 315 "email": "security@paragonie.com", 417 "security",
|
/dokuwiki/vendor/geshi/geshi/ |
H A D | CHANGELOG | 880 - Fixed security hole in contrib/example.php - able to view any file if source
|
/dokuwiki/vendor/geshi/geshi/src/ |
H A D | geshi.php | 54 // Define if GeSHi should be paranoid about security 56 /** Tells GeSHi to be paranoid about security settings */ 697 //Security Fix to prevent external directories using fopen wrappers. 707 //Security Fix to prevent external directories using fopen wrappers. 711 //Security Fix to prevent external directories using fopen wrappers. 715 //Security Fix to prevent external directories using fopen wrappers. 1891 * being used (it has a security hole in PHP4 that has not been patched).
|
12