Processing commands for cont...@bugs.debian.org: > #spip (2.1.1-3squeeze4) stable-security; urgency=low > # > # * Updated security screen to 1.1.3. Prevent cross site scripting on referer > # (addresses missing bits of [CVE-2012-2151]), cross site scripting and PHP > # injections in internal functions. > # Closes: #680118 > # > limit source spip Limiting to bugs with field 'source' containing at least one of 'spip' Limit currently set to 'source':'spip'
> tags 680118 + pending Bug #680118 [spip] spip: PHP injection fixed in new 2.1.16 upstream release Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 680118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680118 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org