Processing commands for [EMAIL PROTECTED]:

> reopen 317263
Bug#317263: egroupware: XMLRPC parsing flaw allows execution of arbitrary PHP 
code
Bug reopened, originator not changed.

> tags 317263 + sarge confirmed upstream fixed-upstream pending
Bug#317263: egroupware: XMLRPC parsing flaw allows execution of arbitrary PHP 
code
Tags were: security
Tags added: sarge, confirmed, upstream, fixed-upstream, pending

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to