pidgin/nest

1f078d295019
Add an alias for /development/wiki/GetABacktrace to the debugging page

Testing Done:
Ran `npm hugo:server` and verified that `/development/wiki/GetABacktrace` redirected to `/development/debugging'

Reviewed at https://reviews.imfreedom.org/r/3029/
---
title: cve-2011-3185-00
date: 2011-08-20T00:00:00.000Z
cveNumber: cve-2011-3185
summary: Pidgin uses clickable links to untrusted executables
discoveredBy: James Burton, Insomnia Security
fixedInRelease: 2.10.0
type: security
layout: cve
hidden: true
---
### Description
If a user clicks on a file:// URI in a received IM in Windows builds of Pidgin,
Pidgin attempts to execute the file. This can be dangerous if the file:// URI is
a path on a network share.
### Mitigation
Don't attempt to execute files when the user clicks a file:// URI. Instead, open
a file browser at the file's location.