CVE-2006-0146 The server.php test script in ADOdb for PHP before... <http://idssi.enyo.de/tracker/CVE-2006-0146> - cacti (remotely exploitable)
CVE-2006-0147 Dynamic code evaluation vulnerability in... <http://idssi.enyo.de/tracker/CVE-2006-0147> - cacti (remotely exploitable) (on a fully updated etch system) This should be listed as fixed for etch and sid as well from version 0.8.6d-1 (First version where adodb code removed from source tarball). That, or your daily report script fixed not to show this. Also: CVE-2006-0456 kernel: strlen_user() DoS on s390 <http://idssi.enyo.de/tracker/CVE-2006-0456> - linux-headers-2.6.15-1-686-smp, linux-image-2.6-686-smp, linux-image-2.6.15-1-686-smp, linux-headers-2.6.15-1, linux-headers-2.6-686-smp Would be nice if arch-specific issues (rare as I'm sure they are) could be hidden if appropriate. Thanks, Julien
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Secure-testing-team mailing list [email protected] http://lists.alioth.debian.org/mailman/listinfo/secure-testing-team

