User: bluedwarf Date: 2007-06-23 19:46:58+0000 Modified: ja/www/security/index.html
Log: Following the modification of the English original page. File Changes: Directory: /ja/www/security/ ============================ File [changed]: index.html Url: http://ja.openoffice.org/source/browse/ja/www/security/index.html?r1=1.11&r2=1.12 Delta lines: +22 -6 -------------------- --- index.html 2007-06-20 16:07:30+0000 1.11 +++ index.html 2007-06-23 19:46:55+0000 1.12 @@ -72,30 +72,46 @@ <h2>ã»ãã¥ãªãã£æ å ±</h2> +<h3> +OpenOffice.org 2.2.1ã§ä¿®æ£ãããèå¼±æ§ +</h3> + <p> -<a href="http://www.openoffice.org/security/CVE-2006-5870.html">CVE-2006-5870: WMF/EMF Processing Failures</a> (è±èª) +<a href="http://www.openoffice.org/security/cves/CVE-2007-2754.html">CVE-2007-2754: Integer overflow and heap-based buffer overflow vulnerability in 3rd party module (freetype) </a> (è±èª) </p> <p> -<a href="http://www.openoffice.org/security/CVE-2007-2.html">CVE-2007-002: WordPerfect Import Vulnerability</a> (è±èª) +<a href="http://www.openoffice.org/security/cves/CVE-2007-0245.html">CVE-2007-0245: Manipulated RTF files can lead to heap overflows and arbitrary code execution</a> (è±èª) </p> +<h3> +OpenOffice.org 2.2ã§ä¿®æ£ãããèå¼±æ§ +</h3> + <p> -<a href="http://www.openoffice.org/security/CVE-2007-0238">CVE-2007-0238: StarCalc Vulnerability</a> (è±èª) +<a href="http://www.openoffice.org/security/cves/CVE-2007-0239.html">CVE-2007-0239: URL Handling Security Vulnerability (Linux/Solaris)</a> (è±èª) </p> <p> -<a href="http://www.openoffice.org/security/CVE-2007-0239.html">CVE-2007-0239: URL Handling Security Vulnerability (Linux/Solaris)</a> (è±èª) +<a href="http://www.openoffice.org/security/cves/CVE-2007-0238">CVE-2007-0238: StarCalc Vulnerability</a> (è±èª) </p> <p> -<a href="http://www.openoffice.org/security/CVE-2007-0245.html">CVE-2007-0245: Manipulated RTF files can lead to heap overflows and arbitrary code execution</a> (è±èª) +<a href="http://www.openoffice.org/security/cves/CVE-2007-2.html">CVE-2007-002: WordPerfect Import Vulnerability</a> (è±èª) </p> +<h3> +OpenOffice.org 2.1ã§ä¿®æ£ãããèå¼±æ§ +</h3> + <p> -<a href="http://www.openoffice.org/security/CVE-2007-2754.html">CVE-2007-2754: Integer overflow and heap-based buffer overflow vulnerability in 3rd party module (freetype) </a> (è±èª) +<a href="http://www.openoffice.org/security/cves/CVE-2006-5870.html">CVE-2006-5870: WMF/EMF Processing Failures</a> (è±èª) </p> +<h3> +ãã®ä» +</h3> + <p>2006-06-29:ã»ãã¥ãªãã£å ±å 2006-06-29 <a href="http://www.openoffice.org/security/bulletin-20060629.html">è± èª</a>ã<a href="bulletin-20060629.html">æ¥æ¬èªè¨³</a></p> --------------------------------------------------------------------- To unsubscribe, e-mail: [メールアドレス保護] For additional commands, e-mail: [メールアドレス保護]
