We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 6dd9106 commit 33a9fb6Copy full SHA for 33a9fb6
python/ql/src/experimental/CWE-643/Xslt.qhelp
@@ -8,9 +8,9 @@
8
This vulnerability can be prevented by not allowing untrusted user input to be passed as a XSL stylesheet.
9
If the application logic necessiates processing untrusted XSL stylesheets, the input should be properly filtered and sanitized before use.
10
</p>
11
- <example>
12
- <p>In the example below, the XSL stylesheet is controlled by the user and hence leads to a vulnerability.</p>
13
- <sample src="xslt.py" />
14
- </example>
15
</recommendation>
16
-</qhelp>
+ <example>
+ <p>In the example below, the XSL stylesheet is controlled by the user and hence leads to a vulnerability.</p>
+ <sample src="xslt.py" />
+ </example>
+</qhelp>
0 commit comments