Skip to content

Commit daece06

Browse files
authored
Merge pull request juice-shop#2507 from juice-shop/l10n_develop
New Crowdin updates
2 parents 6d5e3bd + 923468b commit daece06

1 file changed

Lines changed: 11 additions & 11 deletions

File tree

data/static/i18n/sv_SE.json

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,19 +12,19 @@
1212
"Overwrite the <a href=\"/ftp/legal.md\">Legal Information</a> file.": "Skriv över filen <a href=\"/ftp/legal.md\">Legal Information</a>.",
1313
"Look out for a tweet praising new functionality of the web shop. Then find a third party vulnerability associated with it.": "Håll utkik efter en tweet som lovordar ny funktionalitet i webbshoppen. Hitta därefter en tredjeparts-sårbarhet i samband med den.",
1414
"Reset the password of Bjoern's OWASP account via the <a href=\"/#/forgot-password\">Forgot Password</a> mechanism with <i>the original answer</i> to his security question.": "Återställ lösenordet för Bjoerns OWASP-konto via <a href=\"/#/forgot-password\">Glömt lösenord</a>-mekanismen genom att använda <i>det ursprungliga svaret</i> på hans säkerhetsfråga.",
15-
"Learn about the Token Sale before its official announcement.": "Learn about the Token Sale before its official announcement.",
16-
"The developers truly believe in \"Security through Obscurity\" over actual access restrictions.": "The developers truly believe in \"Security through Obscurity\" over actual access restrictions.",
17-
"Perform a Remote Code Execution that would keep a less hardened application busy <em>forever</em>.": "Perform a Remote Code Execution that would keep a less hardened application busy <em>forever</em>.",
18-
"The feature you need to exploit for this challenge is not directly advertised anywhere.": "The feature you need to exploit for this challenge is not directly advertised anywhere.",
15+
"Learn about the Token Sale before its official announcement.": "Läs mer om Token Sale innan dess officiella tillkännagivande.",
16+
"The developers truly believe in \"Security through Obscurity\" over actual access restrictions.": "Utvecklarna tror verkligen på \"Säkerhet genom Oklarhet\" istället för faktiska tillträdesbegränsningar.",
17+
"Perform a Remote Code Execution that would keep a less hardened application busy <em>forever</em>.": "Utför en Fjärrstyrd Kodexekvering som skulle hålla en mindre härdad applikation upptagen <em>för alltid</em>.",
18+
"The feature you need to exploit for this challenge is not directly advertised anywhere.": "Den funktion du behöver för att utnyttja för denna utmaning visas inte tydligt någonstans.",
1919
"Submit 10 or more customer feedbacks within 20 seconds.": "Skicka in 10 eller fler kundåterkopplingar på mindre än 20 sekunder.",
20-
"After finding a CAPTCHA bypass, write a script that automates feedback submission. Or open many browser tabs and be really quick.": "After finding a CAPTCHA bypass, write a script that automates feedback submission. Or open many browser tabs and be really quick.",
21-
"Change Bender's password into <i>slurmCl4ssic</i> without using SQL Injection or Forgot Password.": "Change Bender's password into <i>slurmCl4ssic</i> without using SQL Injection or Forgot Password.",
22-
"In previous releases this challenge was wrongly accused of being based on CSRF.": "In previous releases this challenge was wrongly accused of being based on CSRF.",
20+
"After finding a CAPTCHA bypass, write a script that automates feedback submission. Or open many browser tabs and be really quick.": "Efter att ha hittat ett sätt att gå runt CAPTCHA, skriv ett skript som automatiserar återkopplingen. Eller öppna många webbläsarflikar och var riktigt snabb.",
21+
"Change Bender's password into <i>slurmCl4ssic</i> without using SQL Injection or Forgot Password.": "Ändra Benders lösenord till <i>slurmCl4ssic</i> utan att använda SQL-injektion eller Glömt lösenord.",
22+
"In previous releases this challenge was wrongly accused of being based on CSRF.": "I tidigare utgåvor anklagades denna utmaning felaktigt för att vara baserad på CSRF.",
2323
"Order the Christmas special offer of 2014.": "Beställ specialerbjudandet från julen 2014.",
24-
"Find out how the application handles unavailable products and try to find a loophole.": "Find out how the application handles unavailable products and try to find a loophole.",
25-
"Bypass the Content Security Policy and perform an XSS attack with <code>&lt;script&gt;alert(`xss`)&lt;/script&gt;</code> on a legacy page within the application.": "Bypass the Content Security Policy and perform an XSS attack with <code>&lt;script&gt;alert(`xss`)&lt;/script&gt;</code> on a legacy page within the application.",
26-
"What is even \"better\" than a legacy page with a homegrown RegEx sanitizer? Having CSP injection issues on the exact same page as well!": "What is even \"better\" than a legacy page with a homegrown RegEx sanitizer? Having CSP injection issues on the exact same page as well!",
27-
"Perform a <i>persisted</i> XSS attack with <code>&lt;iframe src=\"javascript:alert(`xss`)\"&gt;</code> bypassing a <i>client-side</i> security mechanism.": "Perform a <i>persisted</i> XSS attack with <code>&lt;iframe src=\"javascript:alert(`xss`)\"&gt;</code> bypassing a <i>client-side</i> security mechanism.",
24+
"Find out how the application handles unavailable products and try to find a loophole.": "Ta reda på hur programmet hanterar otillgängliga produkter och försök att hitta ett kryphål.",
25+
"Bypass the Content Security Policy and perform an XSS attack with <code>&lt;script&gt;alert(`xss`)&lt;/script&gt;</code> on a legacy page within the application.": "Gå förbi säkerhetspolicyn för innehåll och utför en XSS-attack med <code>&lt;script&gt;alert(`xss`)&lt;/script&gt;</code> på en äldre sida inom programmet.",
26+
"What is even \"better\" than a legacy page with a homegrown RegEx sanitizer? Having CSP injection issues on the exact same page as well!": "Vad är ännu \"bättre\" än en äldre sida med en hemodlad RegEx sanitizer? Att ha CSP-injektionsfrågor på exakt samma sida också!",
27+
"Perform a <i>persisted</i> XSS attack with <code>&lt;iframe src=\"javascript:alert(`xss`)\"&gt;</code> bypassing a <i>client-side</i> security mechanism.": "Utför en <i>ihållig</i> XSS-attack med <code>&lt;iframe src=\"javascript:alert(`xss`)\"&gt;</code> för att undgå en säkerhetsmekanism på <i>klientsidan</i>.",
2828
"Only some input fields validate their input. Even less of these are persisted in a way where their content is shown on another screen.": "Only some input fields validate their input. Even less of these are persisted in a way where their content is shown on another screen.",
2929
"Access a confidential document.": "Access a confidential document.",
3030
"Analyze and tamper with links in the application that deliver a file directly.": "Analyze and tamper with links in the application that deliver a file directly.",

0 commit comments

Comments
 (0)