User: bluedwarf Date: 2007-09-22 18:10:57+0000 Modified: ja/www/security/bulletin.html
Log: Reference translation. File Changes: Directory: /ja/www/security/ ============================ File [changed]: bulletin.html Url: http://ja.openoffice.org/source/browse/ja/www/security/bulletin.html?r1=1.1&r2=1.2 Delta lines: +14 -10 --------------------- --- bulletin.html 2007-09-17 18:18:16+0000 1.1 +++ bulletin.html 2007-09-22 18:10:53+0000 1.2 @@ -35,7 +35,7 @@ </h3> <ul> -<li><a href="http://www.openoffice.org/security/cves/CVE-2007-2834.html">CVE-2007-2834</a>: Manipulated TIFF files can lead to heap overflows and arbitrary code execution +<li><a href="http://www.openoffice.org/security/cves/CVE-2007-2834.html">CVE-2007-2834</a>: Manipulated TIFF files can lead to heap overflows and arbitrary code execution [䏿£ãªTIFFãã¡ã¤ã«ã«ãããã¼ããªã¼ãã¼ããã¼ãçºçããä»»æã®ã³ã¼ããå®è¡ãããå¯è½æ§ãããã¾ã] </ul> <h3> @@ -43,8 +43,8 @@ </h3> <ul> -<li><a href="http://www.openoffice.org/security/cves/CVE-2007-2754.html">CVE-2007-2754</a>: Integer overflow and heap-based buffer overflow vulnerability in 3rd party module (freetype) -<li><a href="http://www.openoffice.org/security/cves/CVE-2007-0245.html">CVE-2007-0245</a>: Manipulated RTF files can lead to heap overflows and arbitrary code execution +<li><a href="http://www.openoffice.org/security/cves/CVE-2007-2754.html">CVE-2007-2754</a>: Integer overflow and heap-based buffer overflow vulnerability in 3rd party module (freetype) [ãµã¼ããã¼ãã£è£½ã¢ã¸ã¥ã¼ã«(freetype)ã®æ´æ°ãªã¼ãã¼ããã¼ã¨ãã¼ããããã¡ãªã¼ãã¼ããã¼èå¼±æ§] +<li><a href="http://www.openoffice.org/security/cves/CVE-2007-0245.html">CVE-2007-0245</a>: Manipulated RTF files can lead to heap overflows and arbitrary code execution [䏿£ãªRTFãã¡ã¤ã«ã«ãããã¼ããªã¼ãã¼ããã¼ãçºçããä»»æã®ã³ã¼ããå®è¡ãããå¯è½æ§ãããã¾ãã] </ul> <h3> @@ -52,9 +52,9 @@ </h3> <ul> -<li><a href="http://www.openoffice.org/security/cves/CVE-2007-0239.html">CVE-2007-0239</a>: URL Handling Security Vulnerability (Linux/Solaris) -<li><a href="http://www.openoffice.org/security/cves/CVE-2007-0238">CVE-2007-0238</a>: StarCalc Vulnerability -<li><a href="http://www.openoffice.org/security/cves/CVE-2007-2.html">CVE-2007-002</a>: WordPerfect Import Vulnerability +<li><a href="http://www.openoffice.org/security/cves/CVE-2007-0239.html">CVE-2007-0239</a>: URL Handling Security Vulnerability (Linux/Solaris) [URLãã³ãã©ã¼ã®èå¼±æ§ (Linux/Solaris)] +<li><a href="http://www.openoffice.org/security/cves/CVE-2007-0238">CVE-2007-0238</a>: StarCalc Vulnerability [StarCalcã®èå¼±æ§] +<li><a href="http://www.openoffice.org/security/cves/CVE-2007-2.html">CVE-2007-002</a>: WordPerfect Import Vulnerability [WordPerfectã¤ã³ãã¼ãã®èå¼±æ§] </ul> <h3> @@ -62,7 +62,7 @@ </h3> <ul> -<li><a href="http://www.openoffice.org/security/cves/CVE-2006-5870.html">CVE-2006-5870</a>: WMF/EMF Processing Failures +<li><a href="http://www.openoffice.org/security/cves/CVE-2006-5870.html">CVE-2006-5870</a>: WMF/EMF Processing Failures [WMF/EMFãã¡ã¤ã«å¦çã®èå¼±æ§] </ul> <h3> @@ -70,11 +70,15 @@ </h3> <ul> -<li><a href="http://www.openoffice.org/security/cves/CVE-2006-2199.html">CVE-2006-2199</a>: Java Applets -<li><a href="http://www.openoffice.org/security/cves/CVE-2006-2198.html">CVE-2006-2198</a>: Macro -<li><a href="http://www.openoffice.org/security/cves/CVE-2006-3117.html">CVE-2006-3117</a>: File Format +<li><a href="http://www.openoffice.org/security/cves/CVE-2006-2199.html">CVE-2006-2199</a>: Java Applets [Javaã¢ãã¬ãã] +<li><a href="http://www.openoffice.org/security/cves/CVE-2006-2198.html">CVE-2006-2198</a>: Macro [ãã¯ã] +<li><a href="http://www.openoffice.org/security/cves/CVE-2006-3117.html">CVE-2006-3117</a>: File Format [ãã¡ã¤ã«ãã©ã¼ããã] </ul> +<p> +èå¼±æ§ã®é£çµ¡ã«ã¤ãã¾ãã¦ã¯ã<a href="./index.html">OpenOffice.orgã»ãã¥ãªãã£ãã¼ã ã«ã¤ãã¦</a>ãã覧ãã ããã +</p> + </div> </body> --------------------------------------------------------------------- To unsubscribe, e-mail: [メールアドレス保護] For additional commands, e-mail: [メールアドレス保護]
