Mercurial > hg > isophonics-drupal-site
view vendor/zendframework/zend-escaper/README.md @ 13:5fb285c0d0e3
Update Drupal core to 8.4.7 via Composer. Security update; I *think* we've
been lucky to get away with this so far, as we don't support self-registration
which seems to be used by the so-called "drupalgeddon 2" attack that 8.4.5
was vulnerable to.
author | Chris Cannam |
---|---|
date | Mon, 23 Apr 2018 09:33:26 +0100 |
parents | 4c8ae668cc8c |
children | e200cb7efeb3 |
line wrap: on
line source
# zend-escaper [](https://secure.travis-ci.org/zendframework/zend-escaper) [](https://coveralls.io/r/zendframework/zend-escaper?branch=master) The OWASP Top 10 web security risks study lists Cross-Site Scripting (XSS) in second place. PHP’s sole functionality against XSS is limited to two functions of which one is commonly misapplied. Thus, the zend-escaper component was written. It offers developers a way to escape output and defend from XSS and related vulnerabilities by introducing contextual escaping based on peer-reviewed rules. - File issues at https://github.com/zendframework/zend-escaper/issues - Documentation is at https://zendframework.github.io/zend-escaper/