diff options
| -rw-r--r-- | docs/content/error/compile/nodomevents.ngdoc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/content/error/compile/nodomevents.ngdoc b/docs/content/error/compile/nodomevents.ngdoc index 67bd81ee..ed1888c7 100644 --- a/docs/content/error/compile/nodomevents.ngdoc +++ b/docs/content/error/compile/nodomevents.ngdoc @@ -11,7 +11,7 @@ For these reasons binding to event handler attributes (all attributes that start An example code that would allow XSS vulnerability by evaluating user input in the window context could look like this: ``` -<input ng-mode="username"> +<input ng-model="username"> <div onclick="{{username}}">click me</div> ``` |
