diff options
author | hackademix | 2018-08-23 15:33:47 +0200 |
---|---|---|
committer | hackademix | 2018-08-23 15:33:47 +0200 |
commit | 80e1f10db51a4f78b3c89df5e347185a5ba16cb4 (patch) | |
tree | 1e8de529aa29a54cc54d620b8beaa5336acb29a7 /src | |
parent | a874f6031ccca40362b9f3127f3b32097af83731 (diff) | |
download | noscript-80e1f10db51a4f78b3c89df5e347185a5ba16cb4.tar.gz noscript-80e1f10db51a4f78b3c89df5e347185a5ba16cb4.tar.xz noscript-80e1f10db51a4f78b3c89df5e347185a5ba16cb4.zip |
Fixed typo in XSS name sanitization script injection (thanks skriptimaahinen).
Diffstat (limited to 'src')
-rw-r--r-- | src/xss/XSS.js | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/xss/XSS.js b/src/xss/XSS.js index 89f13f7..f95ea04 100644 --- a/src/xss/XSS.js +++ b/src/xss/XSS.js @@ -61,7 +61,7 @@ var XSS = (() => { let block = !!(reasons.urlInjection || reasons.postInjection) if (reasons.protectName) { - await include("bg/COntentScriptOnce.js"); + await include("bg/ContentScriptOnce.js"); await ContentScriptOnce.execute(request, { js: [{file: "/xss/sanitizeName.js"}], }); |