Processing commands for [EMAIL PROTECTED]:

> severity 361915 important
Bug#361915: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Severity set to `important'.

> severity 361917 important
Bug#361917: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Severity set to `important'.

> severity 361916 important
Bug#361916: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Severity set to `important'.

> found 361853 4:4.4.2-1
Bug#361853: phpinfo() Cross Site Scripting PHP 5.1.2 and 4.4.2
Bug marked as found in version 4:4.4.2-1.

> found 361854 4:4.4.2-1
Bug#361854: function *() php/apache Crash PHP 4.4.2 and 5.1.2
Bug marked as found in version 4:4.4.2-1.

> found 361855 4:4.4.2-1
Bug#361855: tempnam() open_basedir bypass PHP 4.4.2 and 5.1.2
Bug marked as found in version 4:4.4.2-1.

> found 361856 4:4.4.2-1
Bug#361856: copy() Safe Mode Bypass PHP 4.4.2 and 5.1.2
Bug marked as found in version 4:4.4.2-1.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to