On 13-May-12 21:25, Moritz Mühlenhoff wrote:
> On Sun, May 13, 2012 at 06:04:03PM +0100, Steve McIntyre wrote:
>> On Tue, Mar 08, 2011 at 10:37:13PM +0100, Moritz Muehlenhoff wrote:
>> Looking at other bugs and security tracker issues in serendipity, I'd
>> be tempted to remove it from Debian anywa
On Sun, May 13, 2012 at 06:04:03PM +0100, Steve McIntyre wrote:
> On Tue, Mar 08, 2011 at 10:37:13PM +0100, Moritz Muehlenhoff wrote:
> >On Tue, Mar 08, 2011 at 02:02:31PM +0100, Hector Romojaro wrote:
> >> Hi,
> >>
> >> About openacs and dotlrn packages, I don't think they are affected by
> >> an
On Tue, Mar 08, 2011 at 10:37:13PM +0100, Moritz Muehlenhoff wrote:
>On Tue, Mar 08, 2011 at 02:02:31PM +0100, Hector Romojaro wrote:
>> Hi,
>>
>> About openacs and dotlrn packages, I don't think they are affected by
>> any of the Xinha vulnerabilities [1][2][3]. The summary says:
>>
>> "Xinha sh
On Tue, Mar 08, 2011 at 02:02:31PM +0100, Hector Romojaro wrote:
> Hi,
>
> About openacs and dotlrn packages, I don't think they are affected by
> any of the Xinha vulnerabilities [1][2][3]. The summary says:
>
> "Xinha ships with several plugins that utilize PHP scripting for special
> usage, li
Hi,
About openacs and dotlrn packages, I don't think they are affected by
any of the Xinha vulnerabilities [1][2][3]. The summary says:
"Xinha ships with several plugins that utilize PHP scripting for special
usage, like the ImageManager or ExtendedFileManager. A 0-day security
exploit has been r
Package: serendipity
Version: 1.5.3-2
Summary of the problem from upstream:
"Xinha ships with several plugins that utilize PHP scripting for special usage,
like the ImageManager or ExtendedFileManager. A 0-day security exploit has been
reported available as of today that exploits the functional
6 matches
Mail list logo