there has been some input about this:
https://issues.apache.org/jira/browse/OFBIZ-260
http://jira.undersunconsulting.com/browse/OFBIZ-559
https://issues.apache.org/jira/browse/OFBIZ-1193
https://issues.apache.org/jira/browse/OFBIZ-1476

Peter Felts sent the following on 3/28/2008 3:29 PM:
> I'm creating my own application using java services. What is the best way to 
> filter out user input to avoid XSS and buffer-overruns (do you even need to 
> worry about buffer-overruns in Java?), etc? For example, if the user inputs 
> the string:
> 
> alert('XSS vulnerability test');
> 
> In a form, what is the best way to prevent this script from being executed 
> (Once the form data is passed to a service of course)? Is there some 
> super-cool Java utility to validate HTML user input?
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 

Reply via email to