W3C home > Mailing lists > Public > public-html-diffs@w3.org > December 2011

hixie: Fix some typos or copypasta. (whatwg r6877)

From: poot <cvsmail@w3.org>
Date: Fri, 16 Dec 2011 15:57:55 -0500
To: public-html-diffs@w3.org
Message-Id: <E1Rbeqo-0007rp-W9@jay.w3.org>
hixie: Fix some typos or copypasta. (whatwg r6877)

http://dev.w3.org/cvsweb/html5/spec/Overview.html?r1=1.5476&r2=1.5477&f=h
http://html5.org/tools/web-apps-tracker?from=6876&to=6877

===================================================================
RCS file: /sources/public/html5/spec/Overview.html,v
retrieving revision 1.5476
retrieving revision 1.5477
diff -u -d -r1.5476 -r1.5477
--- Overview.html	16 Dec 2011 20:53:45 -0000	1.5476
+++ Overview.html	16 Dec 2011 20:55:42 -0000	1.5477
@@ -1802,14 +1802,16 @@
      <li>When allowing URLs to be provided (e.g. for links), the
      scheme of each URL also needs to be explicitly whitelisted, as
      there are many schemes that can be abused. The most prominent
-     example is "<code agents="" but="" can="" have="" historically="" implement="" implemented="" indeed="" others="" title="javascript:</code>" user=""> 
+     example is "<code title="javascript-protocol">javascript:</code>", but user agents
+     can implement (and indeed, have historically implemented)
+     others.</li> 
 
      <li>Allowing a <code><a href="#the-base-element">base</a></code> element to be inserted means any
      <code><a href="#the-script-element">script</a></code> elements in the page with relative links can
      be hijacked, and similarly that any form submissions can get
      redirected to a hostile site.</li>
 
-    </code></ul></dd>
+    </ul></dd>
 
 
    <dt>Cross-site request forgery (CSRF)</dt>
Received on Friday, 16 December 2011 20:57:56 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 20:09:20 UTC