Skip to content

Commit fea6926

Browse files
Apply suggestions from code review
Co-authored-by: Felicity Chapman <[email protected]>
1 parent 7c4275a commit fea6926

File tree

1 file changed

+4
-4
lines changed
  • csharp/ql/src/Security Features/CWE-079

1 file changed

+4
-4
lines changed

csharp/ql/src/Security Features/CWE-079/XSS.qhelp

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ without properly sanitizing the input first, allows for a cross-site scripting v
1212
<recommendation>
1313

1414
<p>
15-
To guard against cross-site scripting, consider using a library providing suitable encoding
16-
functionality, such as the <code>System.Net.WebUtility</code> class to sanitize the untrusted input before writing it to the page.
17-
The references also mention other possible solutions.
15+
To guard against cross-site scripting, consider using a library that provides suitable encoding
16+
functionality, such as the <code>System.Net.WebUtility</code> class, to sanitize the untrusted input before writing it to the page.
17+
For other possible solutions, see the references.
1818
</p>
1919

2020
</recommendation>
@@ -26,7 +26,7 @@ leaving the website vulnerable to cross-site scripting.
2626
</p>
2727
<sample src="XSSBad.cs" />
2828
<p>
29-
Sanitizing the user-controlled data using <code>WebUtility.HtmlEncode</code> method prevents the vulnerability:
29+
Sanitizing the user-controlled data using the <code>WebUtility.HtmlEncode</code> method prevents the vulnerability:
3030
</p>
3131
<sample src="XSSGood.cs" />
3232

0 commit comments

Comments
 (0)