Linda is reviewing posts to a user forum on her company’s website
and, when she browses a certain post, a message pops up in a
dialog box on her screen reading “Alert.” She reviews the source
code for the post and finds the following code snippet:
<script>alert(‘Alert’);</script>
In further discussions with the vendor, Linda finds that they are
willing to correct the issue but do not know how to update their
software. What technique would be most effective in mitigating the
vulnerability of the application to this type of attack?
Select one of the following: