CVE-2006-0146 The server.php test script in ADOdb for PHP before...
  <http://idssi.enyo.de/tracker/CVE-2006-0146>
  - cacti (remotely exploitable)

CVE-2006-0147 Dynamic code evaluation vulnerability in...
  <http://idssi.enyo.de/tracker/CVE-2006-0147>
  - cacti (remotely exploitable)

(on a fully updated etch system)

This should be listed as fixed for etch and sid as well from version
0.8.6d-1 (First version where adodb code removed from source tarball).

That, or your daily report script fixed not to show this.

Also:
CVE-2006-0456 kernel: strlen_user() DoS on s390
  <http://idssi.enyo.de/tracker/CVE-2006-0456>
  - linux-headers-2.6.15-1-686-smp, linux-image-2.6-686-smp,
    linux-image-2.6.15-1-686-smp, linux-headers-2.6.15-1,
    linux-headers-2.6-686-smp
Would be nice if arch-specific issues (rare as I'm sure they are) could
be hidden if appropriate.

Thanks,
Julien


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/secure-testing-team

Reply via email to