Quantcast
Channel: HTML/XSS escape on input vs output - Stack Overflow
Browsing all 3 articles
Browse latest View live

Answer by spookylukey for HTML/XSS escape on input vs output

In addition to what has been written already:Precisely because you have a variety of output formats, and you cannot guarantee that all of them will need HTML escaping. If you are serving data over a...

View Article



Answer by tereško for HTML/XSS escape on input vs output

The original misconceptionDo not confuse sanitation of output with validation.While <script>alert(1);</script> is a perfectly valid username, it definitely must be escaped before showing on...

View Article

HTML/XSS escape on input vs output

From everything I've seen, it seems like the convention for escaping html on user-entered content (for the purposes of preventing XSS) is to do it when rendering content. Most templating languages seem...

View Article
Browsing all 3 articles
Browse latest View live




Latest Images