Skip to content

Commit 3d6a526

Browse files
erik-kroghesbena
andauthored
improve qhelp
Co-authored-by: Esben Sparre Andreasen <[email protected]>
1 parent 4ba5ae0 commit 3d6a526

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

javascript/ql/src/Security/CWE-598/SensitiveGetQuery.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Sensitive information such as user passwords should not be transmitted within th
66
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server,
77
and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked
88
or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are
9-
followed. Placing passwords into the URL therefore increases the risk that they will be captured by an attacker.
9+
followed. Placing sensitive information into the URL therefore increases the risk that it will be captured by an attacker.
1010
</p>
1111
</overview>
1212

0 commit comments

Comments
 (0)