From i2p news ...
2014-07-24: Vulnerability found in I2P based on JS and XSS
The Exploit Dealer Exodus Intelligence has found a vulnerability in I2P
and made this public after trying to sell it. The I2P team got notice of
this issue today and works on a fix to be included in next stable I2P
version 0.9.14. The issue is based on JS and XSS, so disabling
Javascript in your browser or using NoScript will render this exploit
useless on a quick fix. I2P base function is NOT affected by this issue,
it is a pure browser based problem.
On 07/24/2014 04:43 PM, intrigeri wrote:
Hi,
this is work in progress. Needs some time.
Thanks for caring.
Cheers,
--
intrigeri
_______________________________________________
tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support
To unsubscribe from this list, send an empty email to
[email protected].
--
John Francis Lee
Thanon Sanam Gila, Ban Fa Sai
79/151 Moo 22 T. Ropwieng
Mueang Chiangrai 57000
Thailand
_______________________________________________
tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support
To unsubscribe from this list, send an empty email to
[email protected].