On Mon, Mar 11, 2019 at 3:17 AM Wojciech S. Czarnecki <o...@fairbe.org> wrote:
> There is an emerging issue with screenshots of logs or code > being posted > ........... > I also urge anyone who gives their time to look at the posted picture, > just because they can see, and who want to help a screenshot's OP > to demand from her or him that she or he will take her time to repost > her answer this time with errs/code in textual form. > It is wasteful of bandwidth and storage. It is also a risk... perhaps enough to disallow. Image format decoding is not sufficiently safe to be enabled blindly on my mail reader. Images and URIs can be the vector of viruses and malware. https://tools.cisco.com/security/center/viewAlert.x?alertId=52257 "Summary "A vulnerability in Adobe Flash Player could allow an unauthenticated, remote attacker to execute arbitrary code. "The vulnerability is due to improper handling of regular expressions by the affected software. An attacker could exploit this vulnerability by persuading a user to open a malicious web page that contains crafted Flash content. A successful exploit could trigger a stack-based buffer overflow condition in the RegExp class for specific search strategies, which the attacker could use to execute arbitrary code in the context of the current process. "Adobe has confirmed the vulnerability in a security bulletin and released software updates." -- T o m M i t c h e l l -- You received this message because you are subscribed to the Google Groups "golang-nuts" group. To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.