From 947e9828da632394e3c77661089c477074e37829 Mon Sep 17 00:00:00 2001 From: Erik Krogh Kristensen Date: Wed, 22 Apr 2020 10:07:50 +0200 Subject: [PATCH] Update javascript/ql/src/Security/CWE-079/XssThroughDom.qhelp Co-Authored-By: mc <42146119+mchammer01@users.noreply.github.com> --- javascript/ql/src/Security/CWE-079/XssThroughDom.qhelp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/javascript/ql/src/Security/CWE-079/XssThroughDom.qhelp b/javascript/ql/src/Security/CWE-079/XssThroughDom.qhelp index b08423c64c0..0c46d92c196 100644 --- a/javascript/ql/src/Security/CWE-079/XssThroughDom.qhelp +++ b/javascript/ql/src/Security/CWE-079/XssThroughDom.qhelp @@ -17,7 +17,7 @@ If an attacker is able to control the safe sanitized text, then this vulnerabili

To guard against cross-site scripting, consider using contextual output encoding/escaping before -writing text to the page, or one of the other solutions that are mentioned in the references. +writing text to the page, or one of the other solutions that are mentioned in the References section below.