Thanks to visit codestin.com Credit goes to github.com
We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 9fbd293 commit 3d478a3Copy full SHA for 3d478a3
1 file changed
ruby/ql/src/queries/security/cwe-598/SensitiveGetQuery.qhelp
@@ -2,7 +2,7 @@
2
<qhelp>
3
<overview>
4
<p>
5
-Sensitive information such as user passwords should not be transmitted within the query string of the requested URL.
+Sensitive information such as passwords should not be transmitted within the query string of the requested URL.
6
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server,
7
and any proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked
8
or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are
0 commit comments