Processing commands for [EMAIL PROTECTED]:

> tag 359907 + fixed
Bug#359907: Security: Binary safety issue in html_entity_decode() may leak 
memory
Tags were: security
Tags added: fixed

> tag 361914 + fixed
Bug#361914: [CVE-2006-0996] phpinfo() Cross Site Scripting
Tags were: security
Tags added: fixed

> tag 361915 + fixed
Bug#361915: [CVE-2006-1608] copy() Safe Mode Bypass
Tags were: security
Tags added: fixed

> tag 361916 + fixed
Bug#361916: [CVE-2006-1494] tempnam() open_basedir bypass
Tags were: security
Tags added: fixed

> tag 361917 + fixed
Bug#361917: [CVE-2006-1549] PHP allows local users to cause a crash by defining 
and executing a recursive function.
Tags were: security
Tags added: fixed

> tag 365312 + fixed
Bug#365312: CVE-2006-1990/CVE-2006-1991: Security vulnerabilities in php
Tags were: security
Tags added: fixed

> tag 366109 + fixed
Bug#366109: php5: PHP 5.1.3, 5.1.4 released
There were no tags set.
Tags added: fixed

> tag 368595 + fixed
Bug#368595: php5: CVE-2006-1014 and CVE-2006-1015: argument injection in 
mb_send_mail function
Tags were: security
Tags added: fixed

> quit
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to