Fri, 30 Aug 2024 19:33:36 -0500
Update the plugins page for the new process
This includes defining the process and providing a template for a new issue to
add new plugins. I did go through and audit `No IRC /WHO` so we had at least
one validated entry.
Testing Done:
Ran `npm run hugo:server` locally and verified the page worked and checked the new links.
Bugs closed: NEST-53
Reviewed at https://reviews.imfreedom.org/r/3450/
--- title: cve-2011-3185-00 date: 2011-08-20T00:00:00.000Z cveNumber: cve-2011-3185 summary: Pidgin uses clickable links to untrusted executables discoveredBy: James Burton, Insomnia Security fixedInRelease: 2.10.0 type: security layout: cve hidden: true --- ### Description If a user clicks on a file:// URI in a received IM in Windows builds of Pidgin, Pidgin attempts to execute the file. This can be dangerous if the file:// URI is a path on a network share. ### Mitigation Don't attempt to execute files when the user clicks a file:// URI. Instead, open a file browser at the file's location.