This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/struts-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new a87e86dbd Updates stage by Jenkins
a87e86dbd is described below

commit a87e86dbd09a1d63a904efe6552e1152fcc5167b
Author: jenkins <bui...@apache.org>
AuthorDate: Wed Jan 3 01:12:43 2024 +0000

    Updates stage by Jenkins
---
 content/security/index.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/content/security/index.html b/content/security/index.html
index 477442f7b..998d4b1cc 100644
--- a/content/security/index.html
+++ b/content/security/index.html
@@ -469,7 +469,7 @@ state.</p>
 <h3 id="restricting-access-to-the-struts-context-actioncontext">Restricting 
access to the Struts Context (ActionContext)</h3>
 
 <p>The Struts ActionContext is a core construct of the Struts framework. It is 
shared and manipulated throughout the
-codebase. From the ActionContext, it is possible to access application 
parameters, the ‘OgnlValueStack’, the current
+codebase. From the ActionContext, it is possible to access application 
parameters, the OgnlValueStack, the current
 request/response/session, the servlet context, the Guice container, and a 
number of other objects either directly or
 indirectly via the directly exposed objects. The Struts ActionContext enables 
powerful features and functionality, but
 it also presents a major security risk if not properly secured.</p>

Reply via email to