<feed xmlns='http://www.w3.org/2005/Atom'>
<title>ports/lang/p5-JavaScript-Value-Escape/pkg-plist, branch pkg-install-eol</title>
<subtitle>FreeBSD ports tree</subtitle>
<id>https://cgit-dev.freebsd.org/ports/atom?h=pkg-install-eol</id>
<link rel='self' href='https://cgit-dev.freebsd.org/ports/atom?h=pkg-install-eol'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/'/>
<updated>2014-01-29T17:46:33Z</updated>
<entry>
<title>- add stage support</title>
<updated>2014-01-29T17:46:33Z</updated>
<author>
<name>Andrej Zverev</name>
<email>az@FreeBSD.org</email>
</author>
<published>2014-01-29T17:46:33Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=073942c880a4e31c6e91aaef30f6d9a64633ad26'/>
<id>urn:sha1:073942c880a4e31c6e91aaef30f6d9a64633ad26</id>
<content type='text'>
Approved by:	portmgr (blanket infrastructure)
</content>
</entry>
<entry>
<title>There are a lot of XSS, a security hole typically found in web</title>
<updated>2011-05-19T13:54:39Z</updated>
<author>
<name>Jun Kuriyama</name>
<email>kuriyama@FreeBSD.org</email>
</author>
<published>2011-05-19T13:54:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=d14dec2ee2ca6e901cde51d5666b0d5d3b67d7bb'/>
<id>urn:sha1:d14dec2ee2ca6e901cde51d5666b0d5d3b67d7bb</id>
<content type='text'>
applications, caused by incorrect (or lack of) JavaScript
escaping.  This module is aimed to provide a secure JavaScript
escaping to avoid XSS with JavaScript values.

The escaping routine JavaScript::Value::Escape provides escapes q!"!,
q!'!, q!&amp;!, q!=!, q!-!, q!+!, q!;!, q!&lt;!, q!&gt;!, q!/!, q!\! and control
characters to JavaScript unicode entities like "\u0026".

WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/
</content>
</entry>
</feed>
