Skip to content

Commit

Permalink
[DOCS] Fix typo in ReadMe
Browse files Browse the repository at this point in the history
  • Loading branch information
spimpaov committed May 17, 2019
1 parent 7f79ec1 commit 198e936
Show file tree
Hide file tree
Showing 10 changed files with 10 additions and 10 deletions.
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a10/games-irados/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,7 @@ However, we can also confirm that little information is being logged at the serv

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* Receive a `200 OK` to every and any request done

Expand Down
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a2/insecure-go-project/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ Using this credentials to access local MongoDB, it was possible to check that th

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* Find sensitive information (such as passwords or usernames) hardcoded.

Expand Down
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a2/saidajaula-monster/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -126,7 +126,7 @@ curl -v --cookie "sessionId=eyJwZXJtaXNzYW8iOiAxLCAidXNlcm5hbWUiOiAiZGFuaWVsIn0u

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* Log in as admin or any other user, rather than himself, by modifying the session cookie.

Expand Down
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a3/snake-pro/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,7 @@ sudo tcpdump -i lo0 -X host localhost | grep -C 2 pass --color

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* Capture sensitive information by sniffing on network packages.
* Bonus: What about using HTTPS?
Expand Down
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a4/vinijr-blog/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -110,7 +110,7 @@ curl -d @evilxml.xml localhost:10080/contact.php ; echo

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* Extract data from the server through the method shown above.

Expand Down
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a5/ecommerce-api/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,7 @@ curl -vvv http://localhost:8888/ticket/GUID

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* Access other users' tickets.

Expand Down
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a6/misconfig-wordpress/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -200,7 +200,7 @@ Now, by doing the following curl command to check the HTTP headers of the applic

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* See verbose error messages
* Log in with default credentials
Expand Down
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a6/stegonography/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -119,7 +119,7 @@ Even though we still don't know which NodeJS version is currently running, we've

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* See error stack traces
* Log in with default credentials
Expand Down
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a7/gossip-world/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -134,7 +134,7 @@ The attacker now gets all the input on the server log, as shown below:

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* Execute scripts through input fields

Expand Down
2 changes: 1 addition & 1 deletion owasp-top10-2017-apps/a8/amarelo-designs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -150,7 +150,7 @@ $ nc localhost 9051

## Secure this app

How would you migitate this vulnerability? After your changes, an attacker should not be able to:
How would you mitigate this vulnerability? After your changes, an attacker should not be able to:

* Execute code remotely through a serialization vulnerability

Expand Down

0 comments on commit 198e936

Please sign in to comment.