Processing commands for [EMAIL PROTECTED]: > severity 361915 important Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Severity set to `important'.
> severity 361917 important Bug#361917: function *() php/apache Crash PHP 4.4.2 and 5.1.2 Severity set to `important'. > severity 361916 important Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Severity set to `important'. > found 361853 4:4.4.2-1 Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2 Bug marked as found in version 4:4.4.2-1. > found 361854 4:4.4.2-1 Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2 Bug marked as found in version 4:4.4.2-1. > found 361855 4:4.4.2-1 Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2 Bug marked as found in version 4:4.4.2-1. > found 361856 4:4.4.2-1 Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2 Bug marked as found in version 4:4.4.2-1. > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]