ÿØÿà JFIF ÿÛ „ ( %"1"%)+...383,7(-.-
![]() Server : Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.20 System : Linux st2.domain.com 3.10.0-1127.10.1.el7.x86_64 #1 SMP Wed Jun 3 14:28:03 UTC 2020 x86_64 User : apache ( 48) PHP Version : 7.4.20 Disable Function : NONE Directory : /var/www/html/admin.adimi/vendor/laminas/laminas-escaper/ |
# laminas-escaper [](https://github.com/laminas/laminas-escaper/actions/workflows/continuous-integration.yml) [](https://coveralls.io/github/laminas/laminas-escaper?branch=master) The OWASP Top 10 web security risks study lists Cross-Site Scripting (XSS) in second place. PHP’s sole functionality against XSS is limited to two functions of which one is commonly misapplied. Thus, the laminas-escaper component was written. It offers developers a way to escape output and defend from XSS and related vulnerabilities by introducing contextual escaping based on peer-reviewed rules. ## Installation Run the following to install this library: ```bash $ composer require laminas/laminas-escaper ``` ## Documentation Browse the documentation online at https://docs.laminas.dev/laminas-escaper/ ## Support * [Issues](https://github.com/laminas/laminas-escaper/issues/) * [Chat](https://laminas.dev/chat/) * [Forum](https://discourse.laminas.dev/)