7676 * </p><p>
7777 * Note that in addition to these encoder methods, ESAPI also provides a JSP Tag
7878 * Library ({@code META-INF/esapi.tld}) in the ESAPI jar. This allows one to use
79- * the more convenient JSP tags in JSPs. These * tags are simply wrappers for the
80- * various "encodeForX<i>XYZ</i>()" methods.
79+ * the more convenient JSP tags in JSPs. These JSP tags are simply wrappers for the
80+ * various these "encodeForX<i>XYZ</i>()" method docmented in this {@code Encoder}
81+ * interface.
8182 * </p><p>
8283 * <b>Some important final words:</b>
8384 * <ul>
134135 * </pre>
135136 * or similar simplistic XSS attack payloads and if that is properly encoded
136137 * (or, you don't see an alert box popped in your browser), you consider it
137- * "problem fixed", consider the unit testing sufficient. Unfortunately, that
138- * minimalist testing may not always detect places where you used the wrong decoder. You need to do better.
139- * Fortunately, the aforementioned link,
138+ * "problem fixed", and consider the unit testing sufficient. Unfortunately, that
139+ * minimalist testing may not always detect places where you used the wrong output
140+ * encoder. You need to do better. Fortunately, the aforementioned link,
140141 * <a href="https://arxiv.org/pdf/1804.01862.pdf" target="_blank"
141142 * rel="noopener noreferrer">
142143 * Automated Detecting and Repair of Cross-SiteScripting Vulnerabilities through Unit Testing</a>
143- * provides some insight. You may also wish to look at the
144+ * provides some insight on this . You may also wish to look at the
144145 * <a href="https://github.com/ESAPI/esapi-java-legacy/blob/develop/src/test/java/org/owasp/esapi/reference/EncoderTest.java"
145- * target="_blank" rel="noopener noreferrer">ESAPI Encoder JUnittest cases</a>.
146+ * target="_blank" rel="noopener noreferrer">ESAPI Encoder JUnittest cases</a> for ideas .
146147 * If you are really ambitious, an excellent resource for XSS attack patterns is
147148 * <a href="https://beefproject.com/" target="_blank" rel="noopener noreferrer">BeEF - The Browser Exploitation Framework Project</a>.
148149 * </li>
@@ -366,12 +367,12 @@ public interface Encoder {
366367 * The best approach is to make sure any single-quotes are double-quoted.
367368 * Another possible approach is to use the {escape} syntax described in the
368369 * JDBC specification in section 1.5.6.
369- *
370+ *
370371 * However, this syntax does not work with all drivers, and requires
371372 * modification of all queries.
372373 *
373- * @see <a href="http ://java.sun .com/j2se/1.4.2/docs/guide/ jdbc/getstart/statement.html ">JDBC Specification</a>
374- * @see java. sql.PreparedStatement
374+ * @see <a href="https ://download.oracle .com/otn-pub/jcp/ jdbc-4_2-mrel2-spec/jdbc4.2-fr-spec.pdf ">JDBC Specification</a>
375+ * @see <a href="https://docs.oracle.com/javase/8/docs/api/ java/sql/PreparedStatement.html">java. sql.PreparedStatement</a>
375376 *
376377 * @param codec
377378 * a Codec that declares which database 'input' is being encoded for (ie. MySQL, Oracle, etc.)
@@ -462,15 +463,15 @@ public interface Encoder {
462463
463464 /**
464465 * Encode data for use in an XML element. The implementation should follow the <a
465- * href="http ://www.w3schools.com/ xml/xml_encoding.asp">XML Encoding
466- * Standard</a> from the W3C.
466+ * href="https ://www.w3.org/TR/REC- xml/#charencoding">Character Encoding in Entities</a>
467+ * from W3C.
467468 * <p>
468469 * The use of a real XML parser is strongly encouraged. However, in the
469470 * hopefully rare case that you need to make sure that data is safe for
470471 * inclusion in an XML document and cannot use a parse, this method provides
471472 * a safe mechanism to do so.
472473 *
473- * @see <a href="http ://www.w3schools.com/ xml/xml_encoding.asp">XML Encoding Standard </a>
474+ * @see <a href="https ://www.w3.org/TR/REC- xml/#charencoding">Character Encoding in Entities </a>
474475 *
475476 * @param input
476477 * the text to encode for XML
@@ -481,16 +482,16 @@ public interface Encoder {
481482 String encodeForXML (String input );
482483
483484 /**
484- * Encode data for use in an XML attribute. The implementation should follow
485- * the <a href="http ://www.w3schools.com/ xml/xml_encoding.asp">XML Encoding
486- * Standard</a> from the W3C.
485+ * Encode data for use in an XML attribute. The implementation should follow the <a
486+ * href="https ://www.w3.org/TR/REC- xml/#charencoding">Character Encoding in Entities</a>
487+ * from W3C.
487488 * <p>
488489 * The use of a real XML parser is highly encouraged. However, in the
489490 * hopefully rare case that you need to make sure that data is safe for
490491 * inclusion in an XML document and cannot use a parse, this method provides
491492 * a safe mechanism to do so.
492493 *
493- * @see <a href="http ://www.w3schools.com/ xml/xml_encoding.asp">XML Encoding Standard </a>
494+ * @see <a href="https ://www.w3.org/TR/REC- xml/#charencoding">Character Encoding in Entities </a>
494495 *
495496 * @param input
496497 * the text to encode for use as an XML attribute
0 commit comments