From d14dec2ee2ca6e901cde51d5666b0d5d3b67d7bb Mon Sep 17 00:00:00 2001 From: Jun Kuriyama Date: Thu, 19 May 2011 13:54:39 +0000 Subject: There are a lot of XSS, a security hole typically found in web applications, caused by incorrect (or lack of) JavaScript escaping. This module is aimed to provide a secure JavaScript escaping to avoid XSS with JavaScript values. The escaping routine JavaScript::Value::Escape provides escapes q!"!, q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!!, q!/!, q!\! and control characters to JavaScript unicode entities like "\u0026". WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/ --- lang/Makefile | 1 + 1 file changed, 1 insertion(+) (limited to 'lang/Makefile') diff --git a/lang/Makefile b/lang/Makefile index 64af218e3bb3..08a96db0cba7 100644 --- a/lang/Makefile +++ b/lang/Makefile @@ -213,6 +213,7 @@ SUBDIR += p5-JavaScript SUBDIR += p5-JavaScript-SpiderMonkey SUBDIR += p5-JavaScript-Squish + SUBDIR += p5-JavaScript-Value-Escape SUBDIR += p5-List-MoreUtils SUBDIR += p5-Modern-Perl SUBDIR += p5-Parse-Perl -- cgit v1.2.3