You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Keeps {productname} dependencies up to date, and
48
+
* Provides recommendations about enforcing HTTPS with HSTS, and
47
49
* Provides information about how to configure a Content Security Policy that works with {productname}.
48
50
49
51
[[scripts-and-xss-vulnerabilities]]
@@ -55,8 +57,13 @@ SVGs (Scalable Vector Graphics) are not supported in {productname} to protect ou
55
57
56
58
From the 1st of January 2020, Security Advisories for patched XSS vulnerabilities will be published on the https://github.com/tinymce/tinymce/security/advisories?state=published[{productname} GitHub repository Security page].
57
59
60
+
[[keeping-dependencies-up-to-date]]
61
+
=== Keeping dependencies up-to-date
62
+
63
+
To protect our users, {companyname} ensures that the TinyMCE dependencies are updated before the next version (major or minor) is released.
64
+
58
65
[[enforcing-https-with-hsts]]
59
-
=== Enforcing HTTPS with HSTS
66
+
== Enforcing HTTPS with HSTS
60
67
61
68
The {companyname} security team strongly recommends that customers embedding {productname} configure their web servers to include the HTTP Strict Transport Security (HSTS) header for websites served over HTTPS. This can be achieved by updating the server configurations to enable HSTS.
62
69
@@ -70,11 +77,6 @@ For comprehensive guidance on implementing HSTS, refer to the following resource
0 commit comments