DELTA 422582 0 18941 SVN† † )– ˆ…•z †„:› (name>zh- 2016-09-21½†ŸC=e> http://mail-archives.apache.org/mod_mbox/hive-u’à† †   ‡vƒæ?†Ÿ@t>1.3.3™€† †   ‘Zz†Ÿ.ubygem-actionpackŸ † † >½†ŸC=uote cite="https://www.phpmyadmin.net/security/PMASA-2016-2/"¥À† † >½†ŸC=e (out-of-bounds array access) or possibly have unspecif«à† † >½†ŸC=range>1.638 ²€† † >½†ŸC=ts> moodle27 2.7.10¸ † † >½†ŸC=> qemu-sbruno qemu-user-static <¾À† † >½†ŸC=> 2015-04-14 2015-0Äà† † >½†ŸC=opic> ipsec-toolsË€† † >½†ŸC=eation of reserved names)

For users using "JeÑ † † >½†ŸC= be executed in an untrusted context, with the bookmarks×À† † >½†ŸC=014-07-18 2014-07-20 <Ýà† †  . ­N†›†Ÿ>-arlier versions are not affected by this flaw䀆 †  ) ¨VÞp†ŸA(/www.w3.org/1999/xhtml">

Werner Kochê † † >½†ŸC=>7.6.1_4 7.8.08.0.5_4½†ŸC= 2013-02-27 ½†ŸC=rrect principal within sandbox

MFSA 2012-98 Fiý€† † >½†ŸC=ted Java applet can escalate its privileges by calling theƒ † †   …¶z†žyJ‰À† † >½†ŸC= Security Team.

[111575] Medium CVE-2011-3020: Natià† † >½†ŸC= –€† †  - ¬vƒ˜†ž^e,> mediawiki 1.16.5œ † † >½†ŸC=RL meta refresh

MFSA 2010-80 Use-after-free error w¢À† † >½†ŸC=http://www.mozilla.org/security/announce/2010/mfsa2010-5¨à† †  / ®^ƒØ=†žtO. 3.*,13.0.18¯€† † >½†ŸC=xhtml">

Joomla! Security Center reports:

½†ŸC=the last directory component in the pathname in an FTP U»À† †   …ˆ=†ŸBÁà† † >½†ŸC=ibrary, can free uninitialized pointers, leading to arbiÈ€† † >½†ŸC=abilities have been identified in Adobe Flash Player thaΠ† † >½†ŸC=dy xmlns="http://www.w3.org/1999/xhtml">

BugTraq reports:ÔÀ† † >½†ŸC=>linux-firefox-devel 3.0.a2007.04.18<Úà† † >½†ŸC= ½†ŸC=

A security vulnerability has been found in Net-SNMP ú€† † >½†ŸC= 2005-04-12 2005-04-19‚€ † † >½†ŸC=n overly long response. Such an overflow allows arbitrary co‚†À† † >½†ŸC=nce phpMyAdmin 2.6.0-pl2, on a system where external MIM‚Œà† †  7 ¶„?®;†› „86 mozilla 1.7.3‚“€† † >½†ŸC=es 2003-‚™ ¿¿B>½¿=bsd.org/cgi/mid.cgi?200303251301.h2PD1m9Y053389