Drupal investigation

HSA Test User c16dcac362 User import %!s(int64=7) %!d(string=hace) años
..
doc c16dcac362 User import %!s(int64=7) %!d(string=hace) años
src c16dcac362 User import %!s(int64=7) %!d(string=hace) años
CHANGELOG.md c16dcac362 User import %!s(int64=7) %!d(string=hace) años
CONDUCT.md c16dcac362 User import %!s(int64=7) %!d(string=hace) años
CONTRIBUTING.md c16dcac362 User import %!s(int64=7) %!d(string=hace) años
LICENSE.md c16dcac362 User import %!s(int64=7) %!d(string=hace) años
README.md c16dcac362 User import %!s(int64=7) %!d(string=hace) años
composer.json c16dcac362 User import %!s(int64=7) %!d(string=hace) años
mkdocs.yml c16dcac362 User import %!s(int64=7) %!d(string=hace) años

README.md

zend-escaper

Build Status Coverage Status

The OWASP Top 10 web security risks study lists Cross-Site Scripting (XSS) in second place. PHP’s sole functionality against XSS is limited to two functions of which one is commonly misapplied. Thus, the zend-escaper component was written. It offers developers a way to escape output and defend from XSS and related vulnerabilities by introducing contextual escaping based on peer-reviewed rules.