lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060710095713.29138.qmail@securityfocus.com> Date: 10 Jul 2006 09:57:13 -0000 From: mattmecham@...il.com To: bugtraq@...urityfocus.com Subject: Re: RE: Invision Vulnerabilities, including remote code execution We have cleaned up much of the post parser in a recent security update which included removing the block of code that attempts to decode hex entities into HTML. Part of the problem is trying to balance a feature rich application against various browser bugs (of which IE is the worst culprit for rendering what should be considered safe HTML code) and programatically safe code.