[Owasp-antisamy] I am here!

Arshan Dabirsiaghi arshan.dabirsiaghi at aspectsecurity.com
Tue Jan 8 17:02:21 EST 2008

This is why I pass the XML document fragment back in the CleanResults object, so you can do any custom
post-processing or XSLT translations. In 1.01 we will be encoding all special characters in dangling text nodes
and I anticipate that coming in the next month or so.

>You would be better off using the HTMLEntityEncoder OWASP utility for
>this purpose.

>http://www.owasp.org/index.php/How_to_perform_HTML_entity_encoding_in_Java <http://www.owasp.org/index.php/How_to_perform_HTML_entity_encoding_in_Java> 

>- Jim
>> Hi,
>> I am newbie to AntiSamy. Is it possible to replace special characters
>> such as # $ with numeric values &#35; &#36; using AntiSamy class which
>> returns CleanResults object?
>> I see that it is automatical done for '&' character when CleanResults
>> .getCleanHTML() is called.
>> Thanks.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-antisamy/attachments/20080108/6ec89335/attachment.html 

More information about the Owasp-antisamy mailing list