Sun, 10 Nov 2024 00:47:44 -0600
Add EionRobb's ChatGPT protocol plugin and update the signal protocol plugins
Testing Done:
Ran `npm run hugo:server` and verified it locally.
Reviewed at https://reviews.imfreedom.org/r/3649/
--- title: cve-2013-6486-00 date: 2014-01-28T00:00:00.000Z cveNumber: cve-2013-6486 summary: Pidgin uses clickable links to untrusted executables discoveredBy: Originally by James Burton, Insomnia Security. Rediscovered by Yves Younan of Sourcefire VRT. fixedInRelease: 2.10.8 type: security layout: cve hidden: true --- ### Description If a user clicks on a file:// URI in a received IM in Windows builds of Pidgin, Pidgin attempts to execute the file. This can be dangerous if the file:// URI is a path on a network share. This was originally reported in [CVE-2011-3185]({{< ref "cve-2011-3185-00" >}}) in 2011 and we attempted to fix it then, but failed. ### Mitigation Don't attempt to execute files when the user clicks a file:// URI. Instead, open a file browser at the file's location.