Hi,
On Wed, Feb 09, 2011 at 09:32:48PM +, Steve Kemp wrote:
Michael Brooks (Sitewatch) discovered a reflective XSS flaw in
cgiirc, a web based IRC client, which could lead to the execution
of arbitrary javascript.
For the old-stable distribution (lenny), this problem has been fixed in
On Wed, Feb 23, 2011 at 10:12:08AM +0100, Philipp Kern wrote:
why wasn't this fixed (e.g. through an NMU) in unstable, too? The
announcement doesn't even mention unstable albeit it's the same version.
sarcasm
We currently seem to have a slightly better protection for the unstable
package; it
On Wed, Feb 23, 2011 at 03:11:23PM +0100, Sven Hoexter wrote:
On Wed, Feb 23, 2011 at 10:12:08AM +0100, Philipp Kern wrote:
why wasn't this fixed (e.g. through an NMU) in unstable, too? The
announcement doesn't even mention unstable albeit it's the same version.
There's some upstream
On Wed, Feb 23, 2011 at 03:11:23PM +0100, Sven Hoexter wrote:
*** An error occurred: Program ending: Bad arg length for Socket::inet_ntoa,
length is 0, should be 4 at /usr/lib/cgi-bin/cgiirc/nph-irc.cgi line 673,
IP line 7.
/sarcasm
I'm not sure if that might be IPv6 related.
That is
On Wednesday 23 February 2011 10:12:08 Philipp Kern wrote:
Hi,
On Wed, Feb 09, 2011 at 09:32:48PM +, Steve Kemp wrote:
Michael Brooks (Sitewatch) discovered a reflective XSS flaw in
cgiirc, a web based IRC client, which could lead to the execution
of arbitrary javascript.
For
5 matches
Mail list logo