Hi Bernd!

Yes, you are right. I tried subproccess a few years ago and I found
something that was not working in what I need (i don't remember what). But
I will try it again :) I will create another bug for that and I will give
you a feedback.

I can't upload that change because It'll be complicate to asure the current
GUI stability and for older versions I have to fix problems but I must not
to make improvements.

In other way, this bug was epic. I learned a lot about (not web PHP)
injection. I want to thank you all the reports, tests and help!!! :) Really
thank you!!

Best regards!!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1410839

Title:
  Shell Command injection in ufw_backend.py

To manage notifications about this bug go to:
https://bugs.launchpad.net/gui-ufw/+bug/1410839/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to