Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 May 2011 13:54:39 +0000 (UTC)
From:      Jun Kuriyama <kuriyama@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/lang Makefile ports/lang/p5-JavaScript-Value-Escape Makefile distinfo pkg-descr pkg-plist
Message-ID:  <201105191354.p4JDsddO088674@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
kuriyama    2011-05-19 13:54:39 UTC

  FreeBSD ports repository

  Modified files:
    lang                 Makefile 
  Added files:
    lang/p5-JavaScript-Value-Escape Makefile distinfo pkg-descr 
                                    pkg-plist 
  Log:
  There are a lot of XSS, a security hole typically found in web
  applications, caused by incorrect (or lack of) JavaScript
  escaping.  This module is aimed to provide a secure JavaScript
  escaping to avoid XSS with JavaScript values.
  
  The escaping routine JavaScript::Value::Escape provides escapes q!"!,
  q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!<!, q!>!, q!/!, q!\! and control
  characters to JavaScript unicode entities like "\u0026".
  
  WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/
  
  Revision  Changes    Path
  1.731     +1 -0      ports/lang/Makefile
  1.1       +21 -0     ports/lang/p5-JavaScript-Value-Escape/Makefile (new)
  1.1       +2 -0      ports/lang/p5-JavaScript-Value-Escape/distinfo (new)
  1.1       +10 -0     ports/lang/p5-JavaScript-Value-Escape/pkg-descr (new)
  1.1       +7 -0      ports/lang/p5-JavaScript-Value-Escape/pkg-plist (new)



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201105191354.p4JDsddO088674>