From abc146686e0498d3e502f768dddc76cdcacde37a Mon Sep 17 00:00:00 2001 From: Daniel Carlier Date: Tue, 14 May 2019 14:08:08 -0300 Subject: [PATCH] [DOCS] Fix objectives link --- owasp-top10-2017-apps/a6/misconfig-wordpress/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/owasp-top10-2017-apps/a6/misconfig-wordpress/README.md b/owasp-top10-2017-apps/a6/misconfig-wordpress/README.md index 7beb9aeba..737981e8b 100644 --- a/owasp-top10-2017-apps/a6/misconfig-wordpress/README.md +++ b/owasp-top10-2017-apps/a6/misconfig-wordpress/README.md @@ -11,7 +11,7 @@ This is a simple Wordpress web application that contains an example of a Securit - [Definition](#what-is-security-misconfiguration) - [Setup](#setup) - [Attack narrative](#attack-narrative) -- [Objectives](#secure-this-app-🔧) +- [Objectives](#secure-this-app) - [Solutions](#pr-solutions) - [Contributing](#contributing) @@ -198,7 +198,7 @@ Now, by doing the following curl command to check the HTTP headers of the applic ---- -## Secure this app 🔧 +## Secure this app How would you migitate this vulnerability? After your changes, an attacker should not be able to: