We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 13decd3 commit 9e2ec9dCopy full SHA for 9e2ec9d
java/ql/src/Security/CWE/CWE-730/RegexInjection.qhelp
@@ -25,7 +25,7 @@ The following example shows an HTTP request parameter that is used to construct
25
</p>
26
<p>
27
In the first case the user-provided regex is not escaped.
28
-If a malicious user provides a regex that has exponential worst case performance,
+If a malicious user provides a regex whose worst-case performance is exponential,
29
then this could lead to a Denial of Service.
30
31
0 commit comments