jewelisheaven: For starters, I do my own testing. This is how I know that 1.6.x are not susceptible to the new exploit. When all the other sheeple were off banning, I was testing all versions from 1.6.0 to 1.7.5. Laugh all you want, but I do not do knee jerk. I do not have control of client bans at bm, but I do at other sites where I have not banned anything in a long time. If you want to run the same tests I have, the link to the c based exploit has been posted repeatedly, or I can supply a small php script I coded up for the occasion. Those links you posted do not show any proof at all the 1.6.1 is exploitable. They just link back to firon posting about something with no evidence. Here's the thing. Now, why on earth would I take the word of someone who wants everyone to believe there is a problem with 1.6.x when he says that, big suprise, there's a problem with 1.6.x The only exploit findable with a google search for 1.6.x is the malformed torrent one for 1.6.0. This was fixed in 1.6.1 which is the version allowed on bm and other sites. Holding out against new bugs by the bucketload is not unwise when the old version has not been proven to be exploitable. If anything, 1.6.1 has one less remote exploit than any of the 1.7.0-1.7.5 versions.