diff --git a/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/no_privilege_escalation/recommendations.md b/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/no_privilege_escalation/recommendations.md index e87bffa6..f48dd026 100644 --- a/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/no_privilege_escalation/recommendations.md +++ b/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/no_privilege_escalation/recommendations.md @@ -2,8 +2,8 @@ There is no single technique to protect from binary planting. However, the following best practices should be adhered to: -All client-side input data should be validated based on the content it is reasonable to contain for users -When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths +- All client-side input data should be validated based on the content it is reasonable to contain for users +- When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths For more information, please see: diff --git a/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/non_default_folder_privilege_escalation/recommendations.md b/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/non_default_folder_privilege_escalation/recommendations.md index e87bffa6..f48dd026 100644 --- a/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/non_default_folder_privilege_escalation/recommendations.md +++ b/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/non_default_folder_privilege_escalation/recommendations.md @@ -2,8 +2,8 @@ There is no single technique to protect from binary planting. However, the following best practices should be adhered to: -All client-side input data should be validated based on the content it is reasonable to contain for users -When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths +- All client-side input data should be validated based on the content it is reasonable to contain for users +- When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths For more information, please see: diff --git a/submissions/description/cross_site_scripting_xss/client_side_injection/recommendations.md b/submissions/description/cross_site_scripting_xss/client_side_injection/recommendations.md index 9f8040bd..00190e5e 100644 --- a/submissions/description/cross_site_scripting_xss/client_side_injection/recommendations.md +++ b/submissions/description/cross_site_scripting_xss/client_side_injection/recommendations.md @@ -5,3 +5,7 @@ There is no single technique to protect from client-side injection. However, the - All client-side input data should be validated based on the content it is reasonable to contain for users - When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths +For more information, please see: + +- +-