<feed xmlns='http://www.w3.org/2005/Atom'>
<title>ports/lang/p5-JavaScript-Value-Escape/distinfo, branch pkg-install-eol</title>
<subtitle>FreeBSD ports tree</subtitle>
<id>https://cgit-dev.freebsd.org/ports/atom?h=pkg-install-eol</id>
<link rel='self' href='https://cgit-dev.freebsd.org/ports/atom?h=pkg-install-eol'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/'/>
<updated>2011-08-06T11:42:02Z</updated>
<entry>
<title>- Upgrade to 0.06.</title>
<updated>2011-08-06T11:42:02Z</updated>
<author>
<name>Jun Kuriyama</name>
<email>kuriyama@FreeBSD.org</email>
</author>
<published>2011-08-06T11:42:02Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=cc340b3e9bb0628d7b13cf4e7755fb31343878cb'/>
<id>urn:sha1:cc340b3e9bb0628d7b13cf4e7755fb31343878cb</id>
<content type='text'>
</content>
</entry>
<entry>
<title>There are a lot of XSS, a security hole typically found in web</title>
<updated>2011-05-19T13:54:39Z</updated>
<author>
<name>Jun Kuriyama</name>
<email>kuriyama@FreeBSD.org</email>
</author>
<published>2011-05-19T13:54:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=d14dec2ee2ca6e901cde51d5666b0d5d3b67d7bb'/>
<id>urn:sha1:d14dec2ee2ca6e901cde51d5666b0d5d3b67d7bb</id>
<content type='text'>
applications, caused by incorrect (or lack of) JavaScript
escaping.  This module is aimed to provide a secure JavaScript
escaping to avoid XSS with JavaScript values.

The escaping routine JavaScript::Value::Escape provides escapes q!"!,
q!'!, q!&amp;!, q!=!, q!-!, q!+!, q!;!, q!&lt;!, q!&gt;!, q!/!, q!\! and control
characters to JavaScript unicode entities like "\u0026".

WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/
</content>
</entry>
</feed>
