Inside a jsp page, I have a input value attribute which is filled this way:
value="${param.name}"
It is vulnerable to a XSS attack if someone manage to put something
"><script>doEvil();</script>
How do I properly escape the value of param.name to fix the vulnerability ?