You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@allura.apache.org by Dave Brondsema <br...@users.sf.net> on 2013/08/26 19:30:37 UTC

[allura:tickets] #6604 IE9 json parsing vulnerability

- **private**: Yes --> No



---

** [tickets:#6604] IE9 json parsing vulnerability**

**Status:** closed
**Labels:** security 
**Created:** Mon Aug 26, 2013 04:25 PM UTC by Dave Brondsema
**Last Updated:** Mon Aug 26, 2013 05:15 PM UTC
**Owner:** Dave Brondsema

http://blog.watchfire.com/wfblog/2011/10/json-based-xss-exploitation.html can be taken advantage of in the wiki.


---

Sent from sourceforge.net because allura-dev@incubator.apache.org is subscribed to https://sourceforge.net/p/allura/tickets/

To unsubscribe from further messages, a project admin can change settings at https://sourceforge.net/p/allura/admin/tickets/options.  Or, if this is a mailing list, you can unsubscribe from the mailing list.