DELTA 362280 0 16902 SVN† † ‚(”x€‚†C–Z †‚‚&imageformats, qt5-imageformats -- DoS vulnerability in the GIF image handler qt4-imageformats 4.8.6_1 qt5-imageformats 5.2.1_1 2014-07-20 ŒÀ† †   t‚ÿ†ž7 /ge>4.4.1’à† †   ‚ó9†žx>™€† † K€J†Ÿ6J

[172264] High CVE-2013-0911: Possible path traversal in database Ÿ † †   —O…醟f EAP-TLS message¥À† † K€J†Ÿ6Jormat-number in XSLT

MFSA 2012-66 HTTPMonitor extension allows f«à† † K€J†Ÿ6J servers may crash on restart after transferring a zone containing thes²€† †   U†“@†Ÿ+ ¸ † †   N„‰@†Ÿ2¾À† † K€J†Ÿ6Jocs/changelogs/unix/1111/ http://www.opera.com/support/kbÄà† † K€J†Ÿ6J.org/2010/05/14/mops-2010-028-php-phar_wrapper_open_url-format-string-vulnË€† † K€J†Ÿ6Jename> CVE-2010-1787 CVE-2010-1788Ñ † † K€J†Ÿ6Jed.

The API function drupal_goto() is susceptible to a phishing ×À† †  6 µv†žUa5package> gnutls-devel 2.9.0Ýà† †   ~‚¯†Ÿ4䀆 † K€J†Ÿ6Jenoffice.org/security/cves/CVE-2008-2237.html">

A security vulnerabiê † † K€J†Ÿ6Jc-5128-11dd-a4e1-0030843d3802"> drupal -- multiple vulnerabilitðÀ† † K€J†Ÿ6Jttp://drupal.org/node/208565">

When theme .tpl.php files are accessiöà† † K€J†Ÿ6J7-11dc-812d-0011098b2f36"> lsh -- multiple vulnerabilities 2006-12-06 2007ƒ † † K€J†Ÿ6JType Enterprise, which can be exploited by malicious people to conduc‰À† † K€J†Ÿ6J into a fixed-length buffer of size PATHLEN without checking to see ià† †   v…܆žmI-tw 2.0.18–€† †   såc†ž )œ † †   c…Ç@†Ÿ¢À† † K€J†Ÿ6Jcvename>CVE-2005-0754 http://www.kde.org/info/securit¨à† † K€J†Ÿ6J-10-08