Security Advisories (2)
CVE-2010-5312 (2014-11-24)

Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.

CVE-2016-4566 (2016-05-22)

Cross-site scripting (XSS) vulnerability in plupload.flash.swf in Plupload before 2.1.9, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via a Same-Origin Method Execution (SOME) attack.

NAME

Yukki::Web::Plugin::SyntaxHighlight - add syntax highlighting to wiki pages

VERSION

version 0.140290

SYNOPSIS

<div>{{highlight:Perl:
use v5.14;
use Moose;

has something => ( is => 'ro' );
}}</div>

<span>{{highlight:JavaScript:window.location.hash = '#foo'}}</span>

{{highlight-div:Perl:
use v5.14;
use Moose;

has something => ( is => 'ro' );
}}

{{highlight-span:JavaScript:window.location.hash = '#foo'}}

DESCRIPTION

Performs syntax highlighting of text. This is able to highlight all the file types listed here with teh Syntax::Highlight::Engine::Kate module:

ATTRIBUTES

format_helpers

Sets up the "highlight" helper.

METHODS

highlight_syntax

This is used to format the double-curly brace {{highlight:...}}. Do not use.

highlight_syntax_asis

This is used to format the double-curly brace {{highlight-asis:...}}. Do not use.

AUTHOR

Andrew Sterling Hanenkamp <hanenkamp@cpan.org>

COPYRIGHT AND LICENSE

This software is copyright (c) 2014 by Qubling Software LLC.

This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.