Skip to content

Commit 923468b

Browse files
committed
New translations en.json (Swedish)
[ci skip] Signed-off-by: Björn Kimminich <bjoern.kimminich@gmx.de>
1 parent bedd8ec commit 923468b

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

data/static/i18n/sv_SE.json

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,16 +15,16 @@
1515
"Learn about the Token Sale before its official announcement.": "Läs mer om Token Sale innan dess officiella tillkännagivande.",
1616
"The developers truly believe in \"Security through Obscurity\" over actual access restrictions.": "Utvecklarna tror verkligen på \"Säkerhet genom Oklarhet\" istället för faktiska tillträdesbegränsningar.",
1717
"Perform a Remote Code Execution that would keep a less hardened application busy <em>forever</em>.": "Utför en Fjärrstyrd Kodexekvering som skulle hålla en mindre härdad applikation upptagen <em>för alltid</em>.",
18-
"The feature you need to exploit for this challenge is not directly advertised anywhere.": "The feature you need to exploit for this challenge is not directly advertised anywhere.",
18+
"The feature you need to exploit for this challenge is not directly advertised anywhere.": "Den funktion du behöver för att utnyttja för denna utmaning visas inte tydligt någonstans.",
1919
"Submit 10 or more customer feedbacks within 20 seconds.": "Skicka in 10 eller fler kundåterkopplingar på mindre än 20 sekunder.",
20-
"After finding a CAPTCHA bypass, write a script that automates feedback submission. Or open many browser tabs and be really quick.": "After finding a CAPTCHA bypass, write a script that automates feedback submission. Or open many browser tabs and be really quick.",
21-
"Change Bender's password into <i>slurmCl4ssic</i> without using SQL Injection or Forgot Password.": "Change Bender's password into <i>slurmCl4ssic</i> without using SQL Injection or Forgot Password.",
22-
"In previous releases this challenge was wrongly accused of being based on CSRF.": "In previous releases this challenge was wrongly accused of being based on CSRF.",
20+
"After finding a CAPTCHA bypass, write a script that automates feedback submission. Or open many browser tabs and be really quick.": "Efter att ha hittat ett sätt att gå runt CAPTCHA, skriv ett skript som automatiserar återkopplingen. Eller öppna många webbläsarflikar och var riktigt snabb.",
21+
"Change Bender's password into <i>slurmCl4ssic</i> without using SQL Injection or Forgot Password.": "Ändra Benders lösenord till <i>slurmCl4ssic</i> utan att använda SQL-injektion eller Glömt lösenord.",
22+
"In previous releases this challenge was wrongly accused of being based on CSRF.": "I tidigare utgåvor anklagades denna utmaning felaktigt för att vara baserad på CSRF.",
2323
"Order the Christmas special offer of 2014.": "Beställ specialerbjudandet från julen 2014.",
24-
"Find out how the application handles unavailable products and try to find a loophole.": "Find out how the application handles unavailable products and try to find a loophole.",
25-
"Bypass the Content Security Policy and perform an XSS attack with <code>&lt;script&gt;alert(`xss`)&lt;/script&gt;</code> on a legacy page within the application.": "Bypass the Content Security Policy and perform an XSS attack with <code>&lt;script&gt;alert(`xss`)&lt;/script&gt;</code> on a legacy page within the application.",
26-
"What is even \"better\" than a legacy page with a homegrown RegEx sanitizer? Having CSP injection issues on the exact same page as well!": "What is even \"better\" than a legacy page with a homegrown RegEx sanitizer? Having CSP injection issues on the exact same page as well!",
27-
"Perform a <i>persisted</i> XSS attack with <code>&lt;iframe src=\"javascript:alert(`xss`)\"&gt;</code> bypassing a <i>client-side</i> security mechanism.": "Perform a <i>persisted</i> XSS attack with <code>&lt;iframe src=\"javascript:alert(`xss`)\"&gt;</code> bypassing a <i>client-side</i> security mechanism.",
24+
"Find out how the application handles unavailable products and try to find a loophole.": "Ta reda på hur programmet hanterar otillgängliga produkter och försök att hitta ett kryphål.",
25+
"Bypass the Content Security Policy and perform an XSS attack with <code>&lt;script&gt;alert(`xss`)&lt;/script&gt;</code> on a legacy page within the application.": "Gå förbi säkerhetspolicyn för innehåll och utför en XSS-attack med <code>&lt;script&gt;alert(`xss`)&lt;/script&gt;</code> på en äldre sida inom programmet.",
26+
"What is even \"better\" than a legacy page with a homegrown RegEx sanitizer? Having CSP injection issues on the exact same page as well!": "Vad är ännu \"bättre\" än en äldre sida med en hemodlad RegEx sanitizer? Att ha CSP-injektionsfrågor på exakt samma sida också!",
27+
"Perform a <i>persisted</i> XSS attack with <code>&lt;iframe src=\"javascript:alert(`xss`)\"&gt;</code> bypassing a <i>client-side</i> security mechanism.": "Utför en <i>ihållig</i> XSS-attack med <code>&lt;iframe src=\"javascript:alert(`xss`)\"&gt;</code> för att undgå en säkerhetsmekanism på <i>klientsidan</i>.",
2828
"Only some input fields validate their input. Even less of these are persisted in a way where their content is shown on another screen.": "Only some input fields validate their input. Even less of these are persisted in a way where their content is shown on another screen.",
2929
"Access a confidential document.": "Access a confidential document.",
3030
"Analyze and tamper with links in the application that deliver a file directly.": "Analyze and tamper with links in the application that deliver a file directly.",

0 commit comments

Comments
 (0)