On Tue, Jan 15, 2013 at 10:45 PM, Dominik Maier <[email protected]> wrote:
> Only issue I could think of is that it could be used to escalate permissions > of an attacker to swath's user's context. Then again, the system already has > to be infiltrated to do that... So, it's still possible to exploit by explicitly invoking swath mule mode in some scripts or so. I think I'll fix this. Regards, -- Theppitak Karoonboonyanan http://linux.thai.net/~thep/ -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

