Processing commands for [EMAIL PROTECTED]:

> retitle 361916 [CVE-2006-1494] tempnam() open_basedir bypass
Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Changed Bug title.

> retitle 361915 [CVE-2006-1608] copy() Safe Mode Bypass
Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Changed Bug title.

> retitle 361914 [CVE-2006-0996] phpinfo() Cross Site Scripting
Bug#361914: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
Changed Bug title.

> retitle 361856 [CVE-2006-1608] copy() Safe Mode Bypass
Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Changed Bug title.
(By the way, that Bug is currently marked as done.)

> retitle 361853 [CVE-2006-0996] phpinfo() Cross Site Scripting
Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
Changed Bug title.
(By the way, that Bug is currently marked as done.)

> retitle 361855 [CVE-2006-1494] tempnam() open_basedir bypass
Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Changed Bug title.
(By the way, that Bug is currently marked as done.)

>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

  • Processed: Retitle Debian Bug Tracking System

Reply via email to