From: "Pavlos Ratis" <dastergon@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] proj/security:master commit in: data/CVE/
Date: Mon, 4 Aug 2014 23:45:11 +0000 (UTC) [thread overview]
Message-ID: <1305276877.a83b5012e4ea9ae583a60f5d7623f9992368b28b.dastergon@gentoo> (raw)
commit: a83b5012e4ea9ae583a60f5d7623f9992368b28b
Author: Stefan Behte <craig <AT> gentoo <DOT> org>
AuthorDate: Fri May 13 08:54:37 2011 +0000
Commit: Pavlos Ratis <dastergon <AT> gentoo <DOT> org>
CommitDate: Fri May 13 08:54:37 2011 +0000
URL: http://git.overlays.gentoo.org/gitweb/?p=proj/security.git;a=commit;h=a83b5012
nfu
svn path=/; revision=2225
---
data/CVE/list | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/data/CVE/list b/data/CVE/list
index 405fdf9..39ac9ce 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -85650,7 +85650,7 @@ CVE-2009-4973 (SQL injection vulnerability in rss.php in TotalCalendar 2.4 allow
CVE-2009-4974 (Directory traversal vulnerability in box_display.php in TotalCalendar ...)
NOT-FOR-US: sweetphp totalcalendar
CVE-2009-4975 (Cross-site scripting (XSS) vulnerability in webview.cpp in ...)
- TODO: check
+ NOT-FOR-US: nokia qtdemobrowser
CVE-2009-4976 (Cross-site scripting (XSS) vulnerability in webkitpart.cpp in ...)
BUG: 335869
CVE-2009-4977 (PHP remote file inclusion vulnerability in index.php in MyBackup 1.4.0 ...)
@@ -85830,7 +85830,7 @@ CVE-2009-5063
CVE-2009-5064 (** DISPUTED ** ldd in the GNU C Library (aka glibc or libc6) 2.13 and ...)
TODO: check
CVE-2009-5065 (Cross-site scripting (XSS) vulnerability in feedparser.py in Universal ...)
- TODO: check
+ NOT-FOR-US: mark_pilgrim feedparser
CVE-2009-5066
RESERVED
CVE-2009-5067
@@ -85842,13 +85842,13 @@ CVE-2009-5069
CVE-2009-5070
RESERVED
CVE-2009-5071 (Unspecified vulnerability in Palm Pre WebOS before 1.2.1 has unknown ...)
- TODO: check
+ NOT-FOR-US: hp palm_pre_webos
CVE-2009-5072 (Memory leak in the ldap_explode_dn function in IBM Tivoli Directory ...)
- TODO: check
+ NOT-FOR-US: ibm tivoli_directory_server
CVE-2009-5073 (IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.59 (aka ...)
- TODO: check
+ NOT-FOR-US: ibm tivoli_directory_server
CVE-2009-5074 (Unspecified vulnerability in the MojoX::Dispatcher::Static ...)
- TODO: check
+ NOT-FOR-US: mojolicious
CVE-2010-0001 (Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 ...)
BUG: 300943
CVE-2010-0002 (The /etc/profile.d/60alias.sh script in the Mandriva bash package for ...)
next reply other threads:[~2014-08-04 23:45 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-08-04 23:45 Pavlos Ratis [this message]
-- strict thread matches above, loose matches on Subject: below --
2014-08-04 23:45 [gentoo-commits] proj/security:master commit in: data/CVE/ Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:45 Pavlos Ratis
2014-08-04 23:44 Pavlos Ratis
2014-08-04 23:44 Pavlos Ratis
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1305276877.a83b5012e4ea9ae583a60f5d7623f9992368b28b.dastergon@gentoo \
--to=dastergon@gentoo.org \
--cc=gentoo-commits@lists.gentoo.org \
--cc=gentoo-dev@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox