From eff77c82628eebfb59aef8ab0e212cb25a26e554 Mon Sep 17 00:00:00 2001 From: marcinzelent Date: Sat, 26 May 2018 18:49:20 +0200 Subject: Fixed formatting --- synopsis.pdf | Bin 156299 -> 165241 bytes synopsis.tex | 8 ++++---- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/synopsis.pdf b/synopsis.pdf index 428edc3..6b34d2b 100644 Binary files a/synopsis.pdf and b/synopsis.pdf differ diff --git a/synopsis.tex b/synopsis.tex index 36494d2..26814cb 100644 --- a/synopsis.tex +++ b/synopsis.tex @@ -439,7 +439,7 @@ example could be a comment on a forum, which contains Javascript code. If the vulnerability is present, it will not be displayed on the page, but it will be executed. It could be simple like: -\begin{minted}{js} +\begin{minted}{html} \end{minted} @@ -448,7 +448,7 @@ This script would create an HTTP request to attacker's website with the victim's cookies, which could contain for example very useful session token. It is also possible to include much bigger scripts with: -\begin{minted}{js} +\begin{minted}{html} \end{minted} @@ -602,13 +602,13 @@ end, I managed to finish my synopsis on time, so it is not a big issue. \bibitem{sbd} OWASP. \textit{Security by Design Principles}. - \texttt{https://www.owasp.org/index.php/\allowbreak{} + \texttt{https://owasp.org/index.php/\allowbreak{} Security\_by\_Design\_Principles} \bibitem{sdl} Microsoft. \textit{Security Development Lifecycle}. - \texttt{https://www.microsoft.com/sdl} + \texttt{https://microsoft.com/sdl} \end{thebibliography} -- cgit v1.2.3