Name: | php-ZendFramework2-Escaper |
---|---|
Version: | 2.4.11 |
Release: | 1.el7 |
Architecture: | noarch |
Group: | Development/Libraries |
Size: | 14689 |
License: | BSD |
RPM: | php-ZendFramework2-Escaper-2.4.11-1.el7.noarch.rpm |
Source RPM: | php-ZendFramework2-2.4.11-1.el7.src.rpm |
Build Date: | Thu Nov 30 2017 |
Build Host: | x86-ol6-builder-06.us.oracle.com |
Vendor: | Oracle America |
URL: | http://framework.zend.com/manual/2.3/en/modules/zend.escaper.introduction.html |
Summary: | Zend Framework 2: Escaper Component |
Description: | The OWASP Top 10 web security risks study lists Cross-Site Scripting (XSS) in second place. PHP’s sole functionality against XSS is limited to two functions of which one is commonly misapplied. Thus, the Zend\Escaper component was written. It offers developers a way to escape output and defend from XSS and related vulnerabilities by introducing contextual escaping based on peer-reviewed rules. |
- Update to 2.4.11 (RHBZ #1409594 / RHBZ #1409591 / ZF2016-04 / CVE-2016-10034)
- Update to 2.4.10 (RHBZ #1343995 / RHBZ #1343990) - Switch to GitHub source (and separate ZendXml pkg) - Move autoloader into spec
- Update to 2.4.8
- Skip WDDX tests on EPEL 7 (i.e. PHP 5.4)
- Update to 2.4.7 - add autoloader in php-ZendFramework2-Loader
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
- Update to 2.3.9
- Update to 2.3.8
- Update to 2.3.7
- Update to 2.3.5 - add patch for icu 54, FTBFS detected by Koschei