tags 491422 + moreinfo unreproducible
severity 491422 normal
thanks
Hello Henk,
I am not able to reproduce this bug. Could you please provide me more
information? What are the steps you follow to make it fail?
Thanks.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscrib
tags 426103 +pending
thanks
El sáb, 26-05-2007 a las 12:13 +0200, Florian Weimer escribió:
> Package: php-xajax
> Version: 0.2.4-2
> Severity: grave
> Tags: security
>
> xajax 0.2.5 fixes some XSS vulnerabilities (CVE-2007-2739,
> CVE-2007-2740). Sorry, upstream hasn't released more details abou
El sáb, 25-11-2006 a las 17:58 +0100, Christian Perrier escribió:
> I'm building the package and I'll upload
Thanks Christian, my sponsor has already done it.
Thanks again,
David.
tags 398619 + pending
tags 395055 + pending
thanks
I think the best solution right now is depending on all cmdline clients
supported by the package, until a best solution is adopted. I will
follow the progress of bugs like #353617 and #398634.
I am waiting for my (or other) sponsor to upload the
El mié, 22-11-2006 a las 13:57 +0100, Steinar H. Gunderson escribió:
> On Wed, Nov 22, 2006 at 01:44:43PM +0100, Andreas Henriksson wrote:
> > Since I've already created it I'll send this patch to the BTS just
> for
> > reference.
> > This one takes the alternative route of not having a hard-depend
severity 370576 minor
thanks
El mar, 06-06-2006 a las 13:01 -0400, Kevin Johnson escribió:
> I have to disagree with the Severity of grave. To exploit you need
> to have register_globals set to on which has not been the default in
> years.
Ok, now the bug has a minor severity. You are right
tags 370576 + fixed-upstream pending
thanks
Fixed in upstream BASE 1.2.5 (sarah). Expect a new package in a few
days.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: acidbase
Severity: grave
Tags: security
Justification: user security hole
http://www.frsirt.com/english/advisories/2006/1996
Advisory ID : FrSIRT/ADV-2006-1996
CVE ID : GENERIC-MAP-NOMATCH
Rated as : High Risk
Remotely Exploitable : Yes
Locally Exploitable : Yes
Release Date : 20
Thank you for explaining in deep the problem Filipus. Though I think
this is not an RC bug, you have gave me good reasons to keep the
severity as serious. I am convinced that this would frustrate other
users like you.
Just one more note, from http://www.sudoku.com/rule.htm:
Every puzzle has just
tags 351043 +help
thanks
I don't know how to deal with this bug. I am quite surprised of its
severity since I totally agree with John.
Of course I don't want to start a "severity war" so I just mark the bug
with the help tag.
> The generation of ambiguous puzzles is a known bug. None of the au
Package: acidbase
Severity: critical
Tags: security
Justification: root security hole
The ImportHTTPVar() function (defined in acid_state_common.inc and
include/base_state_common.inc) is defined as:
function ImportHTTPVar($var_name, $valid_data = "", $exception = "")
and calls CleanVariable($tm
11 matches
Mail list logo