summaryrefslogtreecommitdiffstats
path: root/website/DTSA/DTSA-4-1.html
diff options
context:
space:
mode:
authorJoey Hess <joeyh@debian.org>2005-10-19 22:57:32 +0000
committerJoey Hess <joeyh@debian.org>2005-10-19 22:57:32 +0000
commit7f80adf6e6c3a24596af73c5ac1e03fa4c9d2129 (patch)
tree1fcc64ad61167eff165d0351640f02bac28e3cdf /website/DTSA/DTSA-4-1.html
parenta3151f8075f7c8d4570fe04acbbff2810878636e (diff)
update website to use only CVE references
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2459 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'website/DTSA/DTSA-4-1.html')
-rw-r--r--website/DTSA/DTSA-4-1.html20
1 files changed, 10 insertions, 10 deletions
diff --git a/website/DTSA/DTSA-4-1.html b/website/DTSA/DTSA-4-1.html
index cc986a68d9..910fa05ece 100644
--- a/website/DTSA/DTSA-4-1.html
+++ b/website/DTSA/DTSA-4-1.html
@@ -50,38 +50,38 @@
<dd>No<br></dd>
<dt>CVE:</dt>
<dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1916'>CAN-2005-1916</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1851'>CAN-2005-1851</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1850'>CAN-2005-1850</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852'>CAN-2005-1852</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2448'>CAN-2005-2448</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1916'>CVE-2005-1916</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1851'>CVE-2005-1851</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1850'>CVE-2005-1850</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1852'>CVE-2005-1852</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2448'>CVE-2005-2448</a>
<br></dd>
<br><dt>More information:</dt>
<dd>Multiple vulnerabilities were discovered in ekg:&nbsp;<br>
&nbsp;<br>
-CAN-2005-1916&nbsp;<br>
+CVE-2005-1916&nbsp;<br>
&nbsp;<br>
Eric Romang discovered insecure temporary file creation and arbitrary&nbsp;<br>
command execution in a contributed script that can be exploited by a local&nbsp;<br>
attacker.&nbsp;<br>
&nbsp;<br>
-CAN-2005-1851&nbsp;<br>
+CVE-2005-1851&nbsp;<br>
&nbsp;<br>
Marcin Owsiany and Wojtek Kaniewski discovered potential shell command&nbsp;<br>
injection in a contributed script.&nbsp;<br>
&nbsp;<br>
-CAN-2005-1850&nbsp;<br>
+CVE-2005-1850&nbsp;<br>
&nbsp;<br>
Marcin Owsiany and Wojtek Kaniewski discovered insecure temporary file&nbsp;<br>
creation in contributed scripts.&nbsp;<br>
&nbsp;<br>
-CAN-2005-1852&nbsp;<br>
+CVE-2005-1852&nbsp;<br>
&nbsp;<br>
Multiple integer overflows in libgadu, as used in ekg, allows remote&nbsp;<br>
attackers to cause a denial of service (crash) and possibly execute&nbsp;<br>
arbitrary code via an incoming message.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2448&nbsp;<br>
+CVE-2005-2448&nbsp;<br>
&nbsp;<br>
Multiple endianness errors in libgadu in ekg allow remote attackers to&nbsp;<br>
cause a denial of service (invalid behaviour in applications) on&nbsp;<br>

© 2014-2024 Faster IT GmbH | imprint | privacy policy