From c848a8444fc929ae93e027c119b1e9876579dcdd Mon Sep 17 00:00:00 2001 From: Steffen Deusch Date: Wed, 12 Jun 2024 17:31:48 +0200 Subject: [PATCH] fix heading in 1.7.12 changelog --- CHANGELOG.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 4f9613df05..293f31c8c7 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -66,7 +66,7 @@ future styling). *Note*: because the session id is in a http-only cookie by default, the only way to perform this attack prior to this change is if your application was already vulnerable to an XSS attack, which itself grants more escalated "privileges” than the CSRF fixation. -## JavaScript Client Enhancements +### JavaScript Client Enhancements * Only memorize longpoll fallback for browser session if WebSocket never had a successful connection ## 1.7.11 (2024-02-01)