File: //var/opt/remi/php71/cache/php-pear/7969c900cad4a88dbaba5928287dd3b9rest.cachefile
a:14:{s:7:"attribs";a:4:{s:5:"xmlns";s:36:"http://pear.php.net/dtd/rest.release";s:9:"xmlns:xsi";s:41:"http://www.w3.org/2001/XMLSchema-instance";s:11:"xmlns:xlink";s:28:"http://www.w3.org/1999/xlink";s:18:"xsi:schemaLocation";s:81:"http://pear.php.net/dtd/rest.release http://pear.php.net/dtd/rest.release.xsd";}s:1:"p";a:2:{s:7:"attribs";a:1:{s:10:"xlink:href";s:17:"/rest/p/html_ajax";}s:8:"_content";s:9:"HTML_AJAX";}s:1:"c";s:12:"pear.php.net";s:1:"v";s:5:"0.5.8";s:2:"st";s:4:"beta";s:1:"l";s:4:"LGPL";s:1:"m";s:7:"cweiske";s:1:"s";s:31:"PHP and JavaScript AJAX library";s:1:"d";s:132:"Provides PHP and JavaScript libraries for performing AJAX (Communication from JavaScript to your browser without reloading the page)";s:2:"da";s:19:"2017-02-02 17:04:34";s:1:"n";s:142:"* Fix security bug #21165, CVE-2017-5677: Possible Remote Code Execution through unserializer
Thanks to Egidio Romano for reporting the bug.";s:1:"f";s:6:"140357";s:1:"g";s:39:"http://pear.php.net/get/HTML_AJAX-0.5.8";s:1:"x";a:1:{s:7:"attribs";a:1:{s:10:"xlink:href";s:17:"package.0.5.8.xml";}}}