Discussion Post
An XYZ web development team has become aware of a certain type of security vulnerability in their web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.
1. What kind of Web application vulnerability likely exists in their software?
2. Show step by step commands to prevent this vulnerability.