Java Security Tip: Sanitize user input
Java Security Quick Tip: Always santize user input before you display it in your web app. Displaying user input wideout proper validation or sanitization can lead to cross-site scripting security issues.
With the OWASP Encoder library, you can escape scripts and be positive that they will not be executed in the users' browser. In this video I will answer the following questions
- What is cross-site scripting (XSS)?
- How to handle cross-site scripting (XSS) in Java?
- How can I prevent reflective XSS?
- Can I do something to prevent a stored XSS attack?
Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for Java and many other languages.
Learn more about Snyk http://bit.ly/snyk-io
📱Social Media📱
___________________________________________
Twitter: https://twitter.com/snyksec
Facebook: https://www.facebook.com/snyksec
LinkedIn: https://www.linkedin.com/company/snyk
Website: https://snyk.io/