For kort tid siden offentliggjorde QuakeNet, at der er fundet en ny exploit i mIRC. Det anbefales, at man holder øje med mIRCs hjemmeside for at hente en opdateret udgave af programmet hurtigst muligt.
[21:33:34] -O- (Broadcast) There is a new mIRC exploit that has just been released. It is present in all mIRC versions up to and including version 6.14, and more specifically it is involved with DCCs. We recommend all users put /ignore -wd * in mIRCs perform list, as well as running this command right now.
Update: Det viser sig heldigvis at være falsk alarm i forbindelse med selve mIRC klienten.
Last night we reported that there was a new mIRC exploit. Our sources were wrong. There isn’t. The exploit itself lies in a particular CTCP VERSION reply changer script, we can’t disclose which one. We apologise for any problems or worries the original news post may have caused.


























nice nok…
Der kan man jo bare se. Så er det bare med at køre version 6.14, hvis man altså kører mIRC.
Så vidt jeg forstår updaten så ligger buggen ikke i mirc, men i et script.
Yup. Så nu kan folk bare update til 6.14 og være sikker (hvis de ikke kører med et ukendt script heh).
smart du er