Skip to content

The application must not be subject to input handling vulnerabilities.

An XCCDF Rule