-
-
Notifications
You must be signed in to change notification settings - Fork 835
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A8: Angular instead of AngularJS (A8) #5
Comments
sslHello
changed the title
Angular instead of AngularJS (A8)
A8: Angular instead of AngularJS (A8)
Jun 17, 2017
sslHello
added a commit
that referenced
this issue
Sep 30, 2017
Added 'Scenario #5: The default configuration or a copied old one activates old vulnerable protocol versions or options that can be misused by an attacker or malware.'
CSRF is out, so closing tickets. |
sslHello
added a commit
that referenced
this issue
Oct 16, 2017
see #136: @ossie-git thank you for your various comments I've done the last 2 before I handle it over to Andrew: effectiveness, -> OK Are any administration interfaces exposed to users? added (I do appreciate this, it's one of my favorites for this issue ;-) ) But I am sorry, there was no space left for the examples ' (application, application server, etc.)' @vanderaj But we need to economize 2 lines in the box with 'Example Attack Scenarios' (to get some space for Scenario #5) Added the Links from RC1 Thank you. Cheers Torsten
sslHello
pushed a commit
that referenced
this issue
Sep 21, 2021
Update A06_2021-Vulnerable_and_Outdated_Components.ja.md
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
In A8 in the section How Do I Prevent CSRF you wrote:
You're linking to the Docs of the new Angular version which is just called Angular. AngularJS is version 1.x.
The text was updated successfully, but these errors were encountered: