Skip to content

Commit 837775d

Browse files
committed
Improve translations and remove some language properties
1 parent 3ec13c8 commit 837775d

8 files changed

+19
-2315
lines changed

src/main/resources/messages.properties

+19-19
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
description.access.history = Access history in this page (The latest 15 records).
2-
description.all = Warning: Several links cause severe memory leaks or increase a CPU usage rate. They can make your computer unstable.The result may change depending on JRE type / version, JVM option, OS, hardware (memory, CPU) or etc.
3-
description.capitalize.string = If you enter a string, then the capitalized string is shown. For example: capitalize string -> Capitalize String
2+
description.all = Warning: Several links cause severe memory leaks or increase CPU usage rate. They can make your computer unstable. The results may change depending on JRE type / version, JVM option, OS, hardware (memory, CPU) or etc.
3+
description.capitalize.string = When you enter a string, the capitalized string is shown. For example: capitalize string -> Capitalize String
44
description.design.page = You can change design of this page. Please click one of the links below and change this page to your style.
55
description.design.test = Please click on one of the links below.
6-
description.endless.waiting = If you enter a character count, then a batch (including echo characters of the count) is created and executed.
6+
description.endless.waiting = When you enter a character count, a batch file (including echo characters of the count) is created and executed.
77
description.errors = OutOfMemoryError, StackOverflowError, NoClassDefFoundError, and so on:
8-
description.parse.json = If you enter a JSON string, then a result checked by JSON.parse() of JavaScript is shown.
8+
description.parse.json = When you enter a JSON string, a result checked by JSON.parse() of JavaScript is shown.
99
description.performance.issue = Issues for performance
10-
description.random.string.generator = If you enter a character count, then a random characters of the count is created.
11-
description.response.time = If you add pingurl=[a URL] to query string, the response code and time from the url is shown.
12-
description.reverse.string = If you enter a string, then the reversed string is shown.
10+
description.random.string.generator = When you enter a character count, a random characters of the count is created.
11+
description.response.time = When you add pingurl=[a URL] to query string, the response code and time from the url is shown.
12+
description.reverse.string = When you enter a string, the reversed string is shown.
1313
description.section.exceptions = Exceptions, extending from java.lang.RuntimeException:
1414
description.send.mail = You can send a mail to the site administrator.
1515
description.test.regular.expression = Please test if an input string matches the regular expression <code>^([a-z0-9]+[-]{0,1}){1,100}$</code>.
@@ -46,9 +46,9 @@ function.description.path.traversal = There is a path traver
4646
function.description.redirect.loop = Redirect loop occurs if you click this link.
4747
function.description.round.off.error = Round off error can occur.
4848
function.description.session.fixation = This login page is vulnerable for session fixation attack.
49-
function.description.slow.regular.expression = It takes time to parse the regular expression if you enter a specific string.
50-
function.description.slow.string.plus.operation = It takes time to append strings if you enter a large number.
51-
function.description.slow.unnecessary.object.creation = If you input a large number, it takes time to respond due to unnecessary object creation.
49+
function.description.slow.regular.expression = It takes time to parse a regular expression.
50+
function.description.slow.string.plus.operation = It takes time to append strings.
51+
function.description.slow.unnecessary.object.creation = It takes time to respond due to unnecessary object creation.
5252
function.description.sql.injection = There is an SQL injection vulnerability in this page.
5353
function.description.thread.leak = Thread leak occurs every time you load this page.
5454
function.description.throwable = {0} is thrown if you click this link.
@@ -166,7 +166,7 @@ label.your.mail = Your Mail Address
166166
label.your.name = Your Name
167167

168168
msg.account.locked = Your account is locked out because the number of login failures exceeds {0} times.
169-
msg.add.users.by.xml = If you upload an XML file of the following format, users can be registered all at once.
169+
msg.add.users.by.xml = When you upload an XML file of the following format, users can be registered all at once.
170170
msg.admin.page.top = Well come to admins page!!
171171
msg.answer.is.correct = Your answer is correct!
172172
msg.authentication.fail = Authentication failed. Please login again.
@@ -189,8 +189,8 @@ msg.enter.json.string = Please enter JSON string.
189189
msg.enter.mail = Please enter your mail address.
190190
msg.enter.math.expression = Please enter a mathematical expression. You can use <code>java.lang.Math</code> in the expression. For example, <code>Math.sqrt(Math.pow(2, 6)) - 5</code>
191191
msg.enter.name = Please enter your name.
192-
msg.enter.name.and.passwd = If you enter your name and password, then your secret number is shown.
193-
msg.enter.passwd = If you enter a new password and click the submit button, then your password will be changed.
192+
msg.enter.name.and.passwd = When you enter your name and password, your secret number is shown.
193+
msg.enter.passwd = When you enter a new password and click the submit button, your password will be changed.
194194
msg.enter.positive.number = Please enter a positive number.
195195
msg.enter.string = Please enter a string.
196196
msg.error.user.not.exist = User does not exist or password does not match.
@@ -213,7 +213,7 @@ msg.note.clickjacking = This page receives a request that a user doe
213213
msg.note.clientinfo = If the directory listing feature works and you access to http://localhost:8080/uid/, then you can see the file list in the uid directory. If you login as an acount written in http://localhost:8080/uid/adminpassword.txt you can access to /uid/serverinfo.jsp.
214214
msg.note.codeinjection = If you enter <code>{}');java.lang.System.exit(0);//</code> , then JavaVM is forcibly finished due to code injection.
215215
msg.note.commandinjection = If you enter <code>@Runtime@getRuntime().exec('rm -fr /your-important-dir/')</code> , then your important directory is removed on your server.
216-
msg.note.createobjects = If you enter a large number, it takes time to respond due to unnecessary object creation.
216+
msg.note.createobjects = If you enter a large number, then it takes time to respond due to unnecessary object creation.
217217
msg.note.csrf = This page receives a request that a user does not intend and changes the user's password.
218218
msg.note.dangerous.file.inclusion = Change the query string to <code>template=[URL where malicious JSP file is deployed]</code>, then a malicious code is executed.
219219
msg.note.db.connection.leak.occur = DB connection leak occurs every time you load this page.
@@ -230,14 +230,14 @@ msg.note.memoryleak3 = Memory leak occurs in C heap space every tim
230230
msg.note.mojibake = Mojibake occurs if you enter a multi-byte string.
231231
msg.note.netsocketleak = Network socket leak occurs every time you load this page.
232232
msg.note.not.use.ext.db = Database connection leak occurs if using an external RDBMS such as MySQL. Please edit <code>application.properties</code> if using an external RDBMS.
233-
msg.note.nullbyteinjection = If using Java earlier than version 1.7.0_40 and you add <code>fileName=../WEB-INF/web.xml%00</code> to the query string, you can download a file which includes the content of web.xml.
233+
msg.note.nullbyteinjection = If using Java earlier than version 1.7.0_40 and you add <code>fileName=../WEB-INF/web.xml%00</code> to the query string, then you can download a file which includes the content of web.xml.
234234
msg.note.open.redirect = You can login with <code>admin</code> and <code>password</code>. If you add <code>goto=[an URL of a malicious site]</code> to the query string, you can redirect to the malicious site.
235235
msg.note.path.traversal = Change the query string to <code>template=../uid/adminpassword.txt?</code>, then you can see the content of adminpassword.txt in this page.
236236
msg.note.roundofferror = Round off error occurs if you enter 1.
237237
msg.note.session.fixation = You can login with <code>admin</code> and <code>password</code>. The URL rewriting feature works on this page in order to support clients that cannot use cookie, so the session fixation attack is possible.
238-
msg.note.slowregex = If you enter string to <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaあ</code>, parse processing will take several tens of seconds<br> &nbsp;If you enter string to <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaあ</code>, then no response will be received.
238+
msg.note.slowregex = If you enter string to <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaあ</code>, then the parse processing will take several tens of seconds.<br> &nbsp;If you enter string to <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaあ</code>, then no response will be received.
239239
msg.note.sqlijc = You can see a secret number if you enter <code>Mark</code> and <code>password</code>. You can see other users information if you enter password to <code>' OR '1'='1</code>
240-
msg.note.strplusopr = If you enter a large number then the processing will take several tens of seconds because the string is created by "+" (plus) operator.
240+
msg.note.strplusopr = If you enter a large number, then the processing will take several tens of seconds because the string is created by "+" (plus) operator.
241241
msg.note.threadleak = Thread leak occurs every time you load this page.
242242
msg.note.truncationerror = Truncation error occurs if you enter 3 or 7 or 9.
243243
msg.note.unrestrictedextupload = If you upload JSP file (named exit.jsp) including <code><% System.exit(0); %></code> and access to http://localhost:8080/uploadFiles/exit.jsp, then JavaVM is forcibly finished.
@@ -246,7 +246,7 @@ msg.note.verbose.errror.message = You can login with <code>admin</code> and <c
246246
msg.note.xee = If you upload the following XML file, it will waste server resources.
247247
msg.note.xss = Session ID is shown if you enter name to <code>>tpircs/<;)eikooc.tnemucod(trela>tpIrcs<</code>
248248
msg.note.xxe.step1 = If you create the following DTD file on a web server that can be accessed from this server, for example, http://attacker.site/vulnerable.dtd
249-
msg.note.xxe.step2 = and upload the following XML file, you can display the password file (/etc/passwd) on the Linux server.
249+
msg.note.xxe.step2 = and upload the following XML file, then you can display the password file (/etc/passwd) on the Linux server.
250250
msg.passwd.change.failed = Password change failed.
251251
msg.passwd.changed = Your password is successfully changed.
252252
msg.passwd.is.too.short = The password must be at least 8 characters.
@@ -261,7 +261,7 @@ msg.sent.mail = The mail was sent successfully.
261261
msg.unknown.exception.occur = Unknown exception occurs : {0}
262262
msg.update.records = Updated {0} records.
263263
msg.update.users = You can update users information.
264-
msg.update.users.by.xml = If you upload an XML file of the following format, users can be updated all at once.
264+
msg.update.users.by.xml = When you upload an XML file of the following format, users can be updated all at once.
265265
msg.user.already.exist = The user already exists.
266266
msg.user.not.exist = The user does not exist.
267267
msg.valid.json = Valid JSON!

0 commit comments

Comments
 (0)