You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/assets/YAML/default/Implementation/ApplicationHardening.yaml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -55,10 +55,10 @@ Implementation:
55
55
risk:
56
56
The generation of interpreter directives from user-provided data poses difficulties and can introduce vulnerabilities to injection attacks.
57
57
measure: |
58
-
Implementing contextualized encoding fpr the next interpreter, such as employing object-relational mapping tools
58
+
Implementing contextualized encoding for the next interpreter, such as employing object-relational mapping tools
59
59
or utilizing prepared statements, nearly removes the threat of injection vulnerabilities.
60
60
61
-
Also take into account a a secure by default UI framework, which performs automatic contextual encoding of outputs with potential malicious user input (e.g. angular).
61
+
Also take into account a secure by default UI framework, which performs automatic contextual encoding of outputs with potential malicious user input (e.g. angular).
0 commit comments