- From: J Ross Nicoll <jrn@jrn.me.uk>
- Date: Sat, 15 Jan 2011 18:27:51 +0000
- To: public-webapps@w3.org
Err... did someone just try an SQL injection attack on the bugzilla?
On 15/01/11 18:00, bugzilla@jessica.w3.org wrote:
> http://www.w3.org/Bugs/Public/show_bug.cgi?id=11770
>
> Summary: test tx.executeSql("SELECT COUNT(*) FROM ToDo", [],
> function(result){}, function(tx, error){});
> tx.executeSql("SELECT COUNT(*) FROM ToDo", [],
> function(result){}, function(tx, error){});
> tx.executeSql("SELECT COUNT(*) FROM ToDo", [],
> function(result){},
> Product: WebAppsWG
> Version: unspecified
> Platform: Other
> URL: http://www.whatwg.org/specs/web-apps/current-work/#top
> OS/Version: other
> Status: NEW
> Severity: normal
> Priority: P3
> Component: WebSocket API (editor: Ian Hickson)
> AssignedTo: ian@hixie.ch
> ReportedBy: contributor@whatwg.org
> QAContact: member-webapi-cvs@w3.org
> CC: mike@w3.org, public-webapps@w3.org
>
>
> Specification: http://dev.w3.org/html5/websockets/
> Section: http://www.whatwg.org/specs/web-apps/current-work/complete.html#top
>
> Comment:
> test tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){},
> function(tx, error){});
>
> tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){},
> function(tx, error){});
>
> tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){},
> function(tx, error){});
>
>
> Posted from: 61.145.79.212
>
Received on Saturday, 15 January 2011 18:28:27 UTC