Skip to content

Commit 9e2ec9d

Browse files
Jami CogswellJami Cogswell
authored andcommitted
apply docs review suggestion
1 parent 13decd3 commit 9e2ec9d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

java/ql/src/Security/CWE/CWE-730/RegexInjection.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The following example shows an HTTP request parameter that is used to construct
2525
</p>
2626
<p>
2727
In the first case the user-provided regex is not escaped.
28-
If a malicious user provides a regex that has exponential worst case performance,
28+
If a malicious user provides a regex whose worst-case performance is exponential,
2929
then this could lead to a Denial of Service.
3030
</p>
3131
<p>

0 commit comments

Comments
 (0)