From f333d48960485707a1f11675c4b12f8cbe1596fd Mon Sep 17 00:00:00 2001 From: Swissky <12152583+swisskyrepo@users.noreply.github.com> Date: Wed, 13 Nov 2024 14:08:26 +0100 Subject: [PATCH] Fix invalid spaces indents --- Clickjacking/README.md | 158 ++++++++++-------- Insecure Deserialization/Java.md | 10 +- Insecure Management Interface/README.md | 2 +- Insecure Source Code Management/Subversion.md | 19 +-- Java RMI/README.md | 22 +-- LDAP Injection/README.md | 4 +- SQL Injection/README.md | 44 ++--- XSS Injection/5 - XSS in Angular.md | 6 +- 8 files changed, 137 insertions(+), 128 deletions(-) diff --git a/Clickjacking/README.md b/Clickjacking/README.md index 9c0f310..43780cb 100644 --- a/Clickjacking/README.md +++ b/Clickjacking/README.md @@ -1,6 +1,6 @@ # Clickjacking -> Clickjacking is a type of web security vulnerability where a malicious website tricks a user into clicking on something different from what the user perceives, potentially causing the user to perform unintended actions without their knowledge or consent. Users are tricked into performing all sorts of unintended actions as such as typing in the password, clicking on ‘Delete my account’ button, liking a post, deleting a post, commenting on a blog. In other words all the actions that a normal user can do on a legitimate website can be done using clickjacking. +> Clickjacking is a type of web security vulnerability where a malicious website tricks a user into clicking on something different from what the user perceives, potentially causing the user to perform unintended actions without their knowledge or consent. Users are tricked into performing all sorts of unintended actions as such as typing in the password, clicking on ‘Delete my account' button, liking a post, deleting a post, commenting on a blog. In other words all the actions that a normal user can do on a legitimate website can be done using clickjacking. ## Summary @@ -38,10 +38,10 @@ The transparent UI element contains malicious content or actions that are visual the attacker can trick the user into interacting with the hidden content, believing they are interacting with the visible interface. * **How UI Redressing Works:** - * Overlaying Transparent Element: The attacker creates a transparent HTML element (usually a `