Skip to content
Snippets Groups Projects
Commit 028ae9aa authored by Robert David Graham's avatar Robert David Graham
Browse files

remove html tags

parent b1d0d281
No related branches found
No related tags found
No related merge requests found
...@@ -42,7 +42,7 @@ responses in order to: ...@@ -42,7 +42,7 @@ responses in order to:
SYN cookies) SYN cookies)
* flood packets trying to overload bandwidth/storage * flood packets trying to overload bandwidth/storage
* bad data, such as corrupting banners or DNS names trying to exploit * bad data, such as corrupting banners or DNS names trying to exploit
downstream consumers with bad <html> or <script> tags. downstream consumers with bad html or script tags.
The secondary threat is from use of the program. For example, when a bad The secondary threat is from use of the program. For example, when a bad
parameter is entered on the command-line, the program spits it back out parameter is entered on the command-line, the program spits it back out
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment