Tagged articles
23 articles
Page 1 of 1
Top Architect
Top Architect
Sep 3, 2025 · Information Security

Why Same‑Origin Policy Matters: Mastering CORS and Preflight Requests

This article explains the same‑origin policy, why browsers enforce it, how CORS works—including simple requests, preflight OPTIONS checks, required headers, and credential handling—while providing practical examples and a complete request‑flow diagram for secure web development.

CORSPreflight RequestSame-Origin Policy
0 likes · 17 min read
Why Same‑Origin Policy Matters: Mastering CORS and Preflight Requests
Ops Development & AI Practice
Ops Development & AI Practice
Sep 2, 2025 · Information Security

How XSS Bypasses Browser Sandboxes and What You Can Do About It

Even though modern browsers enforce sandboxing and many frameworks add XSS defenses, a successful cross‑site scripting attack can still break through server and browser protections, allowing attackers to hijack sessions, steal data, scan internal networks, exploit browser bugs, or run cryptojacking scripts.

Browser SecurityCSPCryptojacking
0 likes · 9 min read
How XSS Bypasses Browser Sandboxes and What You Can Do About It
Liangxu Linux
Liangxu Linux
May 11, 2025 · Information Security

Fixing Cross-Origin Issues with Nginx: A Practical CORS Guide

This tutorial explains the browser same‑origin policy, demonstrates a cross‑origin request failure between two servers, and shows how to configure Nginx with appropriate Access‑Control headers to enable CORS and allow the client to retrieve JSON data safely.

CORSCross-OriginSame-Origin Policy
0 likes · 5 min read
Fixing Cross-Origin Issues with Nginx: A Practical CORS Guide
Liangxu Linux
Liangxu Linux
Apr 29, 2025 · Backend Development

How to Fix Cross‑Origin Issues with Nginx: A Step‑by‑Step Guide

This article explains the browser same‑origin policy, demonstrates a CORS problem using two servers with an AJAX request, and provides a complete Nginx configuration—including add_header directives—to enable cross‑origin access and resolve the error.

CORSCross-OriginSame-Origin Policy
0 likes · 5 min read
How to Fix Cross‑Origin Issues with Nginx: A Step‑by‑Step Guide
Architecture Digest
Architecture Digest
Apr 18, 2025 · Information Security

Understanding Same-Origin Policy, CORS, and Preflight Requests

The article explains the fundamentals of the browser's same‑origin policy, the security risks it mitigates, how Cross‑Origin Resource Sharing (CORS) works—including simple and preflight requests—and best practices for handling credentials and header restrictions.

CORSCross-OriginPreflight Request
0 likes · 10 min read
Understanding Same-Origin Policy, CORS, and Preflight Requests
Top Architect
Top Architect
Nov 26, 2024 · Information Security

Understanding Same-Origin Policy and CORS: Core Concepts, Simple Requests, and Preflight Mechanics

This article explains the same‑origin policy, its role in protecting browsers from XSS, CSRF and other attacks, illustrates how origins are defined with protocol, host and port, and details how CORS, simple requests and preflight requests enable controlled cross‑origin communication.

Browser SecurityCross-Origin RequestsSame-Origin Policy
0 likes · 15 min read
Understanding Same-Origin Policy and CORS: Core Concepts, Simple Requests, and Preflight Mechanics
AI Illustrated Series
AI Illustrated Series
Feb 9, 2024 · Information Security

Why Does a POST Sometimes Send Two Requests? A Deep Dive into CORS Preflight

This article explains why browsers may issue a duplicate POST request by exploring the same‑origin policy, the mechanics of CORS, the criteria for simple requests, the structure of preflight OPTIONS requests, credential handling, and how development tools like Webpack Dev Server bypass these restrictions.

Browser SecurityCORSCross-Origin
0 likes · 13 min read
Why Does a POST Sometimes Send Two Requests? A Deep Dive into CORS Preflight
Java Tech Enthusiast
Java Tech Enthusiast
Jan 10, 2024 · Information Security

Cross-Origin Resource Sharing (CORS) and Same-Origin Policy Explained

Cross-Origin Resource Sharing (CORS) extends the Same-Origin Policy by permitting controlled cross‑origin requests through simple and preflight flows, using specific headers and credential rules, thereby balancing web security against threats like XSS, CSRF, and injection attacks while enabling safe resource sharing.

Browser SecurityCORBCORS
0 likes · 10 min read
Cross-Origin Resource Sharing (CORS) and Same-Origin Policy Explained
Architect's Guide
Architect's Guide
Jan 6, 2024 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the same‑origin policy, its role in protecting web applications, how browsers enforce it through DOM, web‑data, and network restrictions, and how Cross‑Origin Resource Sharing (CORS) and preflight requests enable controlled cross‑origin communication while maintaining security.

Browser SecurityCORSCross-Origin
0 likes · 12 min read
Understanding Same-Origin Policy and CORS in Web Development
Code Ape Tech Column
Code Ape Tech Column
Sep 28, 2023 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the browser's Same-Origin Policy, its impact on DOM, data, and network access, and how Cross-Origin Resource Sharing (CORS) and preflight requests enable controlled cross-origin communication while preserving security.

Browser SecurityCORSCross-Origin Requests
0 likes · 11 min read
Understanding Same-Origin Policy and CORS in Web Development
IT Services Circle
IT Services Circle
Jul 25, 2023 · Information Security

Exploiting XSS Vulnerabilities and Same‑Origin Policy to Upgrade Risk Levels

This article explains how to combine reflected and stored cross‑site scripting attacks with same‑origin policy abuse to turn a low‑severity XSS vulnerability into a high‑severity issue, detailing discovery, exploitation steps, and a JavaScript payload that harvests user data.

Cross-site scriptingSame-Origin PolicyWeb Security
0 likes · 8 min read
Exploiting XSS Vulnerabilities and Same‑Origin Policy to Upgrade Risk Levels
Laravel Tech Community
Laravel Tech Community
Apr 26, 2022 · Frontend Development

Understanding Cross-Origin Requests and PHP Solutions for CORS

This article explains what cross‑origin (CORS) is, how the browser's same‑origin policy restricts scripts, lists allowed tags, describes common cross‑origin scenarios, and provides practical PHP header code, proxy techniques, and Nginx reverse‑proxy configurations to resolve CORS issues.

CORSCross-OriginPHP
0 likes · 8 min read
Understanding Cross-Origin Requests and PHP Solutions for CORS
System Architect Go
System Architect Go
Feb 28, 2021 · Information Security

Cross-Origin Resource Sharing (CORS) and Same‑Origin Policy: Concepts, Vulnerabilities, and Mitigations

This article explains the fundamentals of Cross‑Origin Resource Sharing (CORS) and the Same‑Origin Policy, illustrates common misconfigurations and attack scenarios such as origin reflection, null origin whitelisting, and TLS downgrade, and provides best‑practice mitigation techniques for secure web development.

CORSCross-Origin AttacksSame-Origin Policy
0 likes · 20 min read
Cross-Origin Resource Sharing (CORS) and Same‑Origin Policy: Concepts, Vulnerabilities, and Mitigations
IT Xianyu
IT Xianyu
Jan 7, 2021 · Information Security

Understanding Same-Origin Policy and Solving CORS Issues in Spring Boot

This article explains the Same-Origin Policy, its security purpose and restrictions, introduces CORS as a solution for cross‑origin AJAX requests, and provides three practical ways—annotation, filter, and WebMvcConfigurerAdapter—to enable CORS in a Spring Boot application.

CORSCross-OriginJava
0 likes · 6 min read
Understanding Same-Origin Policy and Solving CORS Issues in Spring Boot
58 Tech
58 Tech
Sep 18, 2019 · Information Security

Cross-Domain Solutions and Same-Origin Policy Practices in the Cloud Account Platform

The article explains how the 58 Group’s cloud account platform consolidates multiple account systems and provides a unified SDK, detailing cross‑domain challenges, same‑origin policy, and practical solutions such as JSONP, iframe proxies, independent domains, 302 redirects, and CORS to ensure secure, efficient login integration across web, app, and PC clients.

CORSSame-Origin PolicyWeb Security
0 likes · 8 min read
Cross-Domain Solutions and Same-Origin Policy Practices in the Cloud Account Platform