On Mon, Mar 11, 2019 at 3:17 AM Wojciech S. Czarnecki <o...@fairbe.org>
wrote:

> There is an emerging issue with screenshots of logs or code
> being posted
>
...........

> I also urge anyone who gives their time to look at the posted picture,
> just because they can see, and who want to help a screenshot's OP
> to demand from her or him that she or he will take her time to repost
> her answer this time with errs/code in textual form.
>

It is wasteful of bandwidth and storage.
It is also a risk... perhaps enough to disallow.
Image format decoding is not sufficiently safe to be enabled blindly
on my mail reader.   Images and URIs can be the vector of viruses and
malware.

https://tools.cisco.com/security/center/viewAlert.x?alertId=52257
"Summary
"A vulnerability in Adobe Flash Player could allow an unauthenticated,
remote attacker to execute arbitrary code.
"The vulnerability is due to improper handling of regular expressions by
the affected software. An attacker could exploit this vulnerability by
persuading a user to open a malicious web page that contains crafted Flash
content. A successful exploit could trigger a stack-based buffer overflow
condition in the RegExp class for specific search strategies, which the
attacker could use to execute arbitrary code in the context of the current
process.
"Adobe has confirmed the vulnerability in a security bulletin and released
software updates."


-- 
   T o m    M i t c h e l l

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to