File tree Expand file tree Collapse file tree 1 file changed +0
-27
lines changed
Expand file tree Collapse file tree 1 file changed +0
-27
lines changed Original file line number Diff line number Diff line change @@ -613,33 +613,6 @@ function ExportInitButton(sSelector) {
613613 } ) ;
614614}
615615
616- /**
617- * @deprecated 3.0.0 N°4367 deprecated, use {@see CombodoSanitizer.EscapeHtml} instead
618- *
619- * @param sValue value to escape
620- * @param bReplaceAmp if false don't replace "&" (can be useful when sValue contains html entities we want to keep)
621- * @returns {string } escaped value, ready to insert in the DOM without XSS risk
622- *
623- * @since 2.6.5, 2.7.2, 3.0.0 N°3332
624- * @see https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html#rule-1-html-encode-before-inserting-untrusted-data-into-html-element-content
625- * @see https://stackoverflow.com/questions/295566/sanitize-rewrite-html-on-the-client-side/430240#430240 why inserting in the DOM (for
626- * example the text() JQuery way) isn't safe
627- */
628- function EncodeHtml ( sValue , bReplaceAmp ) {
629- var sEncodedValue = ( sValue + '' )
630- . replace ( / < / g, '<' )
631- . replace ( / > / g, '>' )
632- . replace ( / " / g, '"' )
633- . replace ( / ' / g, ''' )
634- . replace ( / \/ / g, '/' ) ;
635-
636- if ( bReplaceAmp ) {
637- sEncodedValue = sEncodedValue . replace ( / & / g, '&' ) ;
638- }
639-
640- return sEncodedValue ;
641- }
642-
643616// Very simple equivalent to format: placeholders are %1$s %2$d ...
644617function Format ( ) {
645618 var args = [ ] ;
You can’t perform that action at this time.
0 commit comments