���� JFIF �� � ( %"1"%)+...383,7(-.-
![]() Server : Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.20 System : Linux st2.domain.com 3.10.0-1127.10.1.el7.x86_64 #1 SMP Wed Jun 3 14:28:03 UTC 2020 x86_64 User : apache ( 48) PHP Version : 7.4.20 Disable Function : NONE Directory : /var/www/html/img.123vid.top/vendor/zendframework/zend-escaper/ |
# zend-escaper [](https://secure.travis-ci.org/zendframework/zend-escaper) [](https://coveralls.io/github/zendframework/zend-escaper?branch=master) The OWASP Top 10 web security risks study lists Cross-Site Scripting (XSS) in second place. PHP’s sole functionality against XSS is limited to two functions of which one is commonly misapplied. Thus, the zend-escaper component was written. It offers developers a way to escape output and defend from XSS and related vulnerabilities by introducing contextual escaping based on peer-reviewed rules. ## Installation Run the following to install this library: ```bash $ composer require zendframework/zend-escaper ``` ## Documentation Browse the documentation online at https://docs.zendframework.com/zend-escaper/ ## Support * [Issues](https://github.com/zendframework/zend-escaper/issues/) * [Chat](https://zendframework-slack.herokuapp.com/) * [Forum](https://discourse.zendframework.com/)