From 43ab44f1f047cba5dde05ccc000aa7632c03fab4 Mon Sep 17 00:00:00 2001 From: Alexander Sokolov Date: Fri, 1 Nov 2019 13:58:12 +0300 Subject: [PATCH] Update security.md --- src/v2/guide/security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/v2/guide/security.md b/src/v2/guide/security.md index 6b7c3c57f1..8d5b05be1a 100644 --- a/src/v2/guide/security.md +++ b/src/v2/guide/security.md @@ -56,7 +56,7 @@ then it would be escaped to the following HTML: " onclick="alert('hi') ``` -thus preventing the close of the `title` attribute to inject new, arbitrary HTML. This escaping is done using native browser APIs, like `setAtttribute`, so a vulnerability can only exist if the browser itself is vulnerable. +thus preventing the close of the `title` attribute to inject new, arbitrary HTML. This escaping is done using native browser APIs, like `setAttribute`, so a vulnerability can only exist if the browser itself is vulnerable. ## Potential Dangers