From i2p news ...

2014-07-24: Vulnerability found in I2P based on JS and XSS

The Exploit Dealer Exodus Intelligence has found a vulnerability in I2P and made this public after trying to sell it. The I2P team got notice of this issue today and works on a fix to be included in next stable I2P version 0.9.14. The issue is based on JS and XSS, so disabling Javascript in your browser or using NoScript will render this exploit useless on a quick fix. I2P base function is NOT affected by this issue, it is a pure browser based problem.



On 07/24/2014 04:43 PM, intrigeri wrote:
Hi,

this is work in progress. Needs some time.
Thanks for caring.

Cheers,
--
intrigeri
_______________________________________________
tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support
To unsubscribe from this list, send an empty email to 
[email protected].



--
John Francis Lee
Thanon Sanam Gila, Ban Fa Sai
79/151 Moo 22 T. Ropwieng
Mueang Chiangrai 57000
Thailand


_______________________________________________
tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to