FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
p5-JavaScript-Value-Escape 0.06 lang on this many watch lists=0 search for ports that depend on this port
Perl extension to avoid XSS with JavaScript value interpolation
Maintained by: kuriyama@FreeBSD.org search for ports maintained by this maintainer
Port Added: 19 May 2011 13:55:03
Also Listed In: perl5
License: not specified in port


There are a lot of XSS, a security hole typically found in web
applications, caused by incorrect (or lack of) JavaScript
escaping.  This module is aimed to provide a secure JavaScript
escaping to avoid XSS with JavaScript values.

The escaping routine JavaScript::Value::Escape provides escapes q!"!,
q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!<!, q!>!, q!/!, q!\! and control
characters to JavaScript unicode entities like "\u0026".

WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/
SVNWeb : Main Web Site : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only required dependencies information. Optional dependencies are not covered.

Required To Build:
  1. lang/perl5.16
Required To Run:
  1. lang/perl5.16

This port is required by:

for Build for Run * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

To install the port: cd /usr/ports/lang/p5-JavaScript-Value-Escape/ && make install clean
To add the package: pkg install lang/p5-JavaScript-Value-Escape


Configuration Options
     No options to configure

Master Sites:
  1. ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/
  2. ftp://ftp.auckland.ac.nz/pub/perl/CPAN/modules/by-module/JavaScript/
  3. ftp://ftp.cpan.org/pub/CPAN/modules/by-module/JavaScript/
  4. ftp://ftp.cpan.org/pub/CPAN/modules/by-module/JavaScript/
  5. ftp://ftp.funet.fi/pub/languages/perl/CPAN/modules/by-module/JavaScript/
  6. ftp://ftp.kddlabs.co.jp/lang/perl/CPAN/modules/by-module/JavaScript/
  7. ftp://ftp.mirrorservice.org/sites/cpan.perl.org/CPAN/modules/by-module/JavaScript/
  8. ftp://ftp.sunet.se/pub/lang/perl/CPAN/modules/by-module/JavaScript/
  9. http://at.cpan.org/modules/by-module/JavaScript/
  10. http://backpan.perl.org/modules/by-module/JavaScript/
  11. http://cpan.metacpan.org/modules/by-module/JavaScript/
  12. http://ftp.jaist.ac.jp/pub/CPAN/modules/by-module/JavaScript/
  13. http://ftp.twaren.net/Unix/Lang/CPAN/modules/by-module/JavaScript/
  14. http://www.cpan.dk/modules/by-module/JavaScript/
  15. http://www.cpan.dk/modules/by-module/JavaScript/
  16. http://www.cpan.org/modules/by-module/JavaScript/

Number of commits found: 5

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
29 Jan 2014 17:46:33
Original commit files touched by this commit  0.06
Revision:341765
az search for other commits by this committer
- add stage support

Approved by:	portmgr (blanket infrastructure)
20 Sep 2013 19:53:10
Original commit files touched by this commit  0.06
Revision:327741
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
lang)
11 Sep 2013 08:56:53
Original commit files touched by this commit  0.06
Revision:326955
az search for other commits by this committer
- convert to the new perl5 framework
- trim Makefile header

Approved by:	portmgr (bapt@, blanket)
06 Aug 2011 11:42:02
Original commit files touched by this commit  0.06
kuriyama search for other commits by this committer
- Upgrade to 0.06.
19 May 2011 13:54:39
Original commit files touched by this commit  0.05
kuriyama search for other commits by this committer
There are a lot of XSS, a security hole typically found in web
applications, caused by incorrect (or lack of) JavaScript
escaping.  This module is aimed to provide a secure JavaScript
escaping to avoid XSS with JavaScript values.

The escaping routine JavaScript::Value::Escape provides escapes q!"!,
q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!<!, q!>!, q!/!, q!\! and control
characters to JavaScript unicode entities like "\u0026".

WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/

Number of commits found: 5

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
phpmyadminSep 13
ossec-hids-clientSep 11
ossec-hids-localSep 11
ossec-hids-serverSep 11
chromiumSep 09
trafficserverSep 05
apache22*Sep 03
apache22-event-mpm*Sep 03
apache22-itk-mpm*Sep 03
apache22-peruser-mpm*Sep 03
apache22-worker-mpm*Sep 03
chromiumAug 26
fileAug 21
py-djangoAug 21
py-django-develAug 21

5 vulnerabilities affecting 12 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24092
Broken 122
Deprecated 93
Ignore 387
Forbidden 17
Restricted 205
No CDROM 94
Vulnerable 21
Expired 7
Set to expire 88
Interactive 0
new 24 hours 6
new 48 hours24
new 7 days52
new fortnight142
new month252

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.