- From: J Ross Nicoll <jrn@jrn.me.uk>
- Date: Sat, 15 Jan 2011 18:27:51 +0000
- To: public-webapps@w3.org
Err... did someone just try an SQL injection attack on the bugzilla? On 15/01/11 18:00, bugzilla@jessica.w3.org wrote: > http://www.w3.org/Bugs/Public/show_bug.cgi?id=11770 > > Summary: test tx.executeSql("SELECT COUNT(*) FROM ToDo", [], > function(result){}, function(tx, error){}); > tx.executeSql("SELECT COUNT(*) FROM ToDo", [], > function(result){}, function(tx, error){}); > tx.executeSql("SELECT COUNT(*) FROM ToDo", [], > function(result){}, > Product: WebAppsWG > Version: unspecified > Platform: Other > URL: http://www.whatwg.org/specs/web-apps/current-work/#top > OS/Version: other > Status: NEW > Severity: normal > Priority: P3 > Component: WebSocket API (editor: Ian Hickson) > AssignedTo: ian@hixie.ch > ReportedBy: contributor@whatwg.org > QAContact: member-webapi-cvs@w3.org > CC: mike@w3.org, public-webapps@w3.org > > > Specification: http://dev.w3.org/html5/websockets/ > Section: http://www.whatwg.org/specs/web-apps/current-work/complete.html#top > > Comment: > test tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){}, > function(tx, error){}); > > tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){}, > function(tx, error){}); > > tx.executeSql("SELECT COUNT(*) FROM ToDo", [], function(result){}, > function(tx, error){}); > > > Posted from: 61.145.79.212 >
Received on Saturday, 15 January 2011 18:28:27 UTC