mirror of
https://github.com/AltarikMC/Launcher
synced 2024-11-21 06:09:51 +01:00
fix possible xss exploit with innerHTML
This commit is contained in:
parent
c53c789122
commit
3b983f12ce
@ -21,9 +21,9 @@ document.body.onload = () => {
|
||||
minMem.max = totalMem
|
||||
maxMem.max = totalMem
|
||||
minMem.value = localStorage.getItem("minMem") != null ? localStorage.getItem("minMem") : 1024
|
||||
outputMinMem.innerHTML = minMem.value
|
||||
outputMinMem.textContent = minMem.value
|
||||
maxMem.value = localStorage.getItem("maxMem") != null ? localStorage.getItem("maxMem") : 2048
|
||||
outputMaxMem.innerHTML = maxMem.value
|
||||
outputMaxMem.textContent = maxMem.value
|
||||
demandModsInformations()
|
||||
}
|
||||
|
||||
@ -134,10 +134,10 @@ disconnectBtn.addEventListener('click', e => {
|
||||
ipcRenderer.send('disconnect')
|
||||
})
|
||||
|
||||
minMem.addEventListener("input", (e) => {
|
||||
outputMinMem.innerHTML = e.target.value
|
||||
minMem.addEventListener("input", e => {
|
||||
outputMinMem.textContent = e.target.value
|
||||
})
|
||||
|
||||
maxMem.addEventListener("input", (e) => {
|
||||
outputMaxMem.innerHTML = e.target.value
|
||||
maxMem.addEventListener("input", e => {
|
||||
outputMaxMem.textContent = e.target.value
|
||||
})
|
Loading…
Reference in New Issue
Block a user