File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
src/main/java/org/owasp/esapi Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change 160
160
* By following that advice, you will minimize the impact and/or likelihood of any
161
161
* vulnerabilities from bugs in the ESAPI code or accidental misuse of the ESAPI
162
162
* library on your part. In particular, whenever there are cases where cients use
163
- * any of these {@link org.owasp.esapi.codecs.Codec} classes drectly , it is highly
163
+ * any of these {@link org.owasp.esapi.codecs.Codec} classes directly , it is highly
164
164
* recommended to perform canonicalization followed by strict input valiation both
165
165
* prior to encoding and after decoding to protect your application from input-based
166
166
* attacks.
@@ -425,7 +425,7 @@ public interface Encoder {
425
425
* </p><p>
426
426
* <b>SECURITY WARNING:</b> This method is <u>NOT</u> recommended. The use of the {@code PreparedStatement}
427
427
* interface is the preferred approach. However, if for some reason
428
- * this is impossible, then this method is provided as significantly weaker
428
+ * this is impossible, then this method is provided as a significantly weaker
429
429
* alternative. In particular, it should be noted that if all you do to
430
430
* address potential SQL Injection attacks is to use this method to escape
431
431
* parameters, you <i>will</i> fail miserably. According to the
You can’t perform that action at this time.
0 commit comments