Security Advisories (3)
CVE-2016-4566 (2016-05-22)

Cross-site scripting (XSS) vulnerability in plupload.flash.swf in Plupload before 2.1.9, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via a Same-Origin Method Execution (SOME) attack.

CVE-2010-5312 (2014-11-24)

Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.

CVE-2021-23562 (2021-12-03)

This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.

NAME

Yukki::Web::Plugin - base class for Yukki plugins

VERSION

version 0.140290

SYNOPSIS

package MyPlugins::LowerCase;
use 5.12.1;
use Moose;

extends 'Yukki::Web::Plugin';

has format_helpers => (
    is          => 'ro',
    isa         => 'HashRef[CodeRef]',
    default     => sub { +{
        'lc' => \&lc_helper,
    } },
);

with 'Yukki::Web::Plugin::Role::FormatHelper';

sub lc_helper { 
    my ($params) = @_;
    return lc $params->{arg};
}

DESCRIPTION

This is the base class for Yukki plugins. It doesn't do much but allow your plugin access to the application singleton and its configuration. For your plugin to actually do something, you must implement a plugin role. See these roles for details:

ATTRIBUTES

app

This is the Yukki::Web singleton. All the methods required in Yukki::Role::App will be delegated.

AUTHOR

Andrew Sterling Hanenkamp <hanenkamp@cpan.org>

COPYRIGHT AND LICENSE

This software is copyright (c) 2014 by Qubling Software LLC.

This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.