User: bluedwarf
Date: 2007-09-22 18:10:57+0000
Modified:
   ja/www/security/bulletin.html

Log:
 Reference translation.

File Changes:

Directory: /ja/www/security/
============================

File [changed]: bulletin.html
Url: 
http://ja.openoffice.org/source/browse/ja/www/security/bulletin.html?r1=1.1&r2=1.2
Delta lines:  +14 -10
---------------------
--- bulletin.html       2007-09-17 18:18:16+0000        1.1
+++ bulletin.html       2007-09-22 18:10:53+0000        1.2
@@ -35,7 +35,7 @@
 </h3>
 
 <ul>
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-2834.html";>CVE-2007-2834</a>:
 Manipulated TIFF files can lead to heap overflows and arbitrary code execution
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-2834.html";>CVE-2007-2834</a>:
 Manipulated TIFF files can lead to heap overflows and arbitrary code execution 
[不正なTIFFファイルによりヒープオーバーフローが発生し、任意のコードを実行される可能性があります]
 </ul>
 
 <h3>
@@ -43,8 +43,8 @@
 </h3>
 
 <ul>
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-2754.html";>CVE-2007-2754</a>:
 Integer overflow and heap-based buffer overflow vulnerability in 3rd party 
module (freetype)
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-0245.html";>CVE-2007-0245</a>:
 Manipulated RTF files can lead to heap overflows and arbitrary code execution
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-2754.html";>CVE-2007-2754</a>:
 Integer overflow and heap-based buffer overflow vulnerability in 3rd party 
module (freetype) 
[サードパーティ製モジュール(freetype)の整数オーバーフローとヒープバッファオーバーフロー脆弱性]
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-0245.html";>CVE-2007-0245</a>:
 Manipulated RTF files can lead to heap overflows and arbitrary code execution 
[不正なRTFファイルによりヒープオーバーフローが発生し、任意のコードを実行される可能性があります。]
 </ul>
 
 <h3>
@@ -52,9 +52,9 @@
 </h3>
 
 <ul>
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-0239.html";>CVE-2007-0239</a>:
 URL Handling Security Vulnerability (Linux/Solaris)
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-0238";>CVE-2007-0238</a>: 
StarCalc Vulnerability
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-2.html";>CVE-2007-002</a>:
 WordPerfect Import Vulnerability
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-0239.html";>CVE-2007-0239</a>:
 URL Handling Security Vulnerability (Linux/Solaris) 
[URLハンドラーの脆弱性 (Linux/Solaris)]
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-0238";>CVE-2007-0238</a>: 
StarCalc Vulnerability [StarCalcの脆弱性]
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-2.html";>CVE-2007-002</a>:
 WordPerfect Import Vulnerability [WordPerfectインポートの脆弱性]
 </ul>
 
 <h3>
@@ -62,7 +62,7 @@
 </h3>
 
 <ul>
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-5870.html";>CVE-2006-5870</a>:
 WMF/EMF Processing Failures
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-5870.html";>CVE-2006-5870</a>:
 WMF/EMF Processing Failures [WMF/EMFファイル処理の脆弱性]
 </ul>
 
 <h3>
@@ -70,11 +70,15 @@
 </h3>
 
 <ul>
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-2199.html";>CVE-2006-2199</a>:
 Java Applets
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-2198.html";>CVE-2006-2198</a>:
 Macro
-<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-3117.html";>CVE-2006-3117</a>:
 File Format
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-2199.html";>CVE-2006-2199</a>:
 Java Applets [Javaアプレット]
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-2198.html";>CVE-2006-2198</a>:
 Macro [マクロ]
+<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-3117.html";>CVE-2006-3117</a>:
 File Format [ファイルフォーマット]
 </ul>
 
+<p>
+脆弱性の連絡につきましては、<a 
href="./index.html">OpenOffice.orgセキュリティチームについて</a>をご覧ください。
+</p>
+
 </div>
 
 </body>




---------------------------------------------------------------------
To unsubscribe, e-mail: 
[&#x30E1;&#x30FC;&#x30EB;&#x30A2;&#x30C9;&#x30EC;&#x30B9;&#x4FDD;&#x8B77;]
For additional commands, e-mail: 
[&#x30E1;&#x30FC;&#x30EB;&#x30A2;&#x30C9;&#x30EC;&#x30B9;&#x4FDD;&#x8B77;]

メールによる返信