Lines Matching full:applications
35 Many applications are used in closed networks where users and servers can
38 some risks in the ways in which applications commonly use libcurl and
40 shows classes of attacks that robust applications should consider. The Common
61 For applications that enable .netrc use, a user who manage to set the right
102 default. Applications are encouraged to restrict that set further.
129 Applications can mitigate against this by disabling
140 server behind a firewall, such as 127.0.0.1 or 10.1.2.3. Applications can
148 display the result. Applications can mitigate against this with the
154 behind a firewall. Applications can mitigate against this by using the
181 overwritten. Applications must not allow any unsanitized URL to be passed in
183 uploads. Instead, the applications should consider handling redirects itself,
187 information to be sent to an unknown second server. Applications can mitigate
204 Applications can mitigate against this by disabling cookies or clearing them
212 Applications must not allow unsanitized SCP: URLs to be passed in for
222 Applications may find it tempting to let users set the URL that it can work
295 this. Instead, applications should monitor the amount of data received within
319 enabled by applications that fail to properly validate server TLS/SSL