X-Git-Url: https://git.martlubbers.net/?a=blobdiff_plain;f=report%2Fv5_input.tex;h=f5857206d10f073bd89012a75030cbdd9a3ca550;hb=14c80128258d8217181f9ddb56d5550e0a20d009;hp=618c2bfbe38adc7fa8bd75046192039fb8d22d1b;hpb=5675de2255bdfceb293ed7418a0478bc0af7cd75;p=ssproject1617.git diff --git a/report/v5_input.tex b/report/v5_input.tex index 618c2bf..f585720 100644 --- a/report/v5_input.tex +++ b/report/v5_input.tex @@ -1,7 +1,11 @@ -\begin{enumerate}[label=5.\arabic*] +\begin{enumerate}[label={5.\arabic*}] \item Verify that the runtime environment is not susceptible to buffer overflows, or that security controls prevent buffer overflows. + As of \emph{OWASP}'s statement\footnote{\url{% + https://www.owasp.org/index.php/Buffer_Overflows\#Platforms_Affected}} + \PHP{} is not surceptible to buffer overflows as long no external + programs or extensions are used which is not the case. % They skip 5.2 \addtocounter{enumi}{1} \item Verify that server side input validation failures result in