The smartest and easiest way to improve your software security. Secure your code, from the start.


xml injection

Secure Coding Technique: Processing XML data, part 1

11th December 2017

Specifications for XML and XML schemas include multiple security flaws. At the same time, these specifications provide the tools required to protect XML applications. Even though we use XML schemas to define the security of XML documents, they can be used to perform a variety of attacks.…