Processing commands for [EMAIL PROTECTED]: > reopen 317263 Bug#317263: egroupware: XMLRPC parsing flaw allows execution of arbitrary PHP code Bug reopened, originator not changed.
> tags 317263 + sarge confirmed upstream fixed-upstream pending Bug#317263: egroupware: XMLRPC parsing flaw allows execution of arbitrary PHP code Tags were: security Tags added: sarge, confirmed, upstream, fixed-upstream, pending > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]