libhtml-defang-perl 1.07-2 source package in Ubuntu

Changelog

libhtml-defang-perl (1.07-2) unstable; urgency=medium

  [ Debian Janitor ]
  * Bump debhelper dependency to >= 9, since that's what is used in
    debian/compat.
  * Bump debhelper from old 9 to 12.
  * Set debhelper-compat version in Build-Depends.
  * Update standards version to 4.4.1, no changes needed.
  * Update standards version to 4.5.0, no changes needed.

  [ Jenkins ]
  * Bump debhelper from old 12 to 13.
  * Update standards version to 4.5.1, no changes needed.

  [ Debian Janitor ]
  * Update standards version to 4.6.1, no changes needed.

 -- Jelmer Vernooij <email address hidden>  Sun, 04 Dec 2022 19:45:42 +0000

Upload details

Uploaded by:
Debian Perl Group
Uploaded to:
Sid
Original maintainer:
Debian Perl Group
Architectures:
all
Section:
perl
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe perl
Noble release universe perl
Mantic release universe perl
Lunar release universe perl

Builds

Lunar: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
libhtml-defang-perl_1.07-2.dsc 2.0 KiB 935d765ff8772bc7b736ad0a543098d66a80dd2e966535d6704cd4dbbed74b2f
libhtml-defang-perl_1.07.orig.tar.gz 45.1 KiB 882dc4a9dcfae8799235f4bad0062ee55ddbe408be1a5e4a7574b262e3fe07ce
libhtml-defang-perl_1.07-2.debian.tar.xz 3.9 KiB 6259334b63768d1d486de22e17b6b9d637d6143318cd0b4f08956dec08be6917

Available diffs

No changes file available.

Binary packages built by this source

libhtml-defang-perl: cleans HTML and CSS of scripting, executable contents and XSS attacks

 HTML::Defang accepts an input HTML and/or CSS string
 and removes any executable code
 including scripting, embedded objects, applets, etc.,
 and neutralises any XSS attacks.
 A whitelist based approach is used
 which means only HTML known to be safe is allowed through.
 .
 HTML::Defang uses a custom html tag parser.
 The parser has been designed and tested
 to work with nasty real world html
 and to try and emulate as close as possible
 what browsers actually do with strange looking constructs.
 The test suite has been built
 based on examples from a range of sources
 such as <http://ha.ckers.org/xss.html>
 and <http://imfo.ru/csstest/css_hacks/import.php>
 to ensure that as many as possible XSS attack scenarios
 have been dealt with.