Markup Context

In addition to the affected code lines we are able to reconstruct the markup context of the vulnerability. The user-supplied data is marked in red.

Example

The markup context for a SQL injection vulnerability is the SQL query itself.