webino / zend-escaper
Securely and safely escape HTML, HTML attributes, JavaScript, CSS, and URLs
2.6.0
2018-05-25 09:50 UTC
Requires
- php: >=7.1
Requires (Dev)
- phpunit/phpunit: ^5.7.27 || ^6.5.8 || ^7.1.2
- zendframework/zend-coding-standard: ~1.0.0
Replaces
- zendframework/zend-escaper: 2.6.0
- dev-develop / 2.7.x-dev
- dev-master / 2.6.x-dev
- 2.6.0
- 2.5.2
- 2.5.1
- 2.5.0
- 2.4.13
- 2.4.12
- 2.4.11
- 2.4.10
- 2.4.9
- 2.4.8
- 2.4.7
- 2.4.6
- 2.4.5
- 2.4.4
- 2.4.3
- 2.4.2
- 2.4.1
- 2.4.0
- 2.4.0rc7
- 2.4.0rc6
- 2.4.0rc5
- 2.4.0rc4
- 2.4.0rc3
- 2.4.0rc2
- 2.4.0rc1
- 2.3.9
- 2.3.8
- 2.3.7
- 2.3.6
- 2.3.5
- 2.3.4
- 2.3.3
- 2.3.2
- 2.3.1
- 2.3.0
- 2.2.10
- 2.2.9
- 2.2.8
- 2.2.7
- 2.2.6
- 2.2.5
- 2.2.4
- 2.2.3
- 2.2.2
- 2.2.1
- 2.2.0
- 2.2.0rc3
- 2.2.0rc2
- 2.2.0rc1
- 2.1.6
- 2.1.5
- 2.1.4
- 2.1.3
- 2.1.2
- 2.1.1
- 2.1.0
- 2.0.8
- 2.0.7
- 2.0.6
- 2.0.5
- 2.0.4
- 2.0.3
This package is auto-updated.
Last update: 2024-11-05 00:15:51 UTC
README
The OWASP Top 10 web security risks study lists Cross-Site Scripting (XSS) in second place. PHP’s sole functionality against XSS is limited to two functions of which one is commonly misapplied. Thus, the zend-escaper component was written. It offers developers a way to escape output and defend from XSS and related vulnerabilities by introducing contextual escaping based on peer-reviewed rules.
- File issues at https://github.com/zendframework/zend-escaper/issues
- Documentation is at https://docs.zendframework.com/zend-escaper/