Err... did someone just try an SQL injection attack on the bugzilla?
On 15/01/11 18:00, [email protected] wrote:
http://www.w3.org/Bugs/Public/show_bug.cgi?id=11770 Summary: test tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){}, function(tx, error){}); tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){}, function(tx, error){}); tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){}, Product: WebAppsWG Version: unspecified Platform: Other URL: http://www.whatwg.org/specs/web-apps/current-work/#top OS/Version: other Status: NEW Severity: normal Priority: P3 Component: WebSocket API (editor: Ian Hickson) AssignedTo: [email protected] ReportedBy: [email protected] QAContact: [email protected] CC: [email protected], [email protected] Specification: http://dev.w3.org/html5/websockets/ Section: http://www.whatwg.org/specs/web-apps/current-work/complete.html#top Comment: test tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){}, function(tx, error){}); tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){}, function(tx, error){}); tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){}, function(tx, error){}); Posted from: 61.145.79.212
