Processing commands for [EMAIL PROTECTED]: > retitle 361916 [CVE-2006-1494] tempnam() open_basedir bypass Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Changed Bug title.
> retitle 361915 [CVE-2006-1608] copy() Safe Mode Bypass Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Changed Bug title. > retitle 361914 [CVE-2006-0996] phpinfo() Cross Site Scripting Bug#361914: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2 Changed Bug title. > retitle 361856 [CVE-2006-1608] copy() Safe Mode Bypass Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Changed Bug title. (By the way, that Bug is currently marked as done.) > retitle 361853 [CVE-2006-0996] phpinfo() Cross Site Scripting Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2 Changed Bug title. (By the way, that Bug is currently marked as done.) > retitle 361855 [CVE-2006-1494] tempnam() open_basedir bypass Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Changed Bug title. (By the way, that Bug is currently marked as done.) > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

