Warning, /frameworks/syndication/autotests/rdf/security_debian.rdf.xml is written in an unsupported language. File is not indexed.
0001 <?xml version="1.0" encoding="iso-8859-1"?> 0002 <?xml-stylesheet href="dsa-rdf.css" type="text/css"?> 0003 <rdf:RDF 0004 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" 0005 xmlns="http://purl.org/rss/1.0/" 0006 xmlns:dc="http://purl.org/dc/elements/1.1/" 0007 xml:lang="en" 0008 > 0009 <!-- source: http://security.debian.org/ 0010 properties: 0011 - description: escaped HTML 0012 - dc:date: short date-only version 0013 --> 0014 <channel rdf:about="http://www.debian.org/security/dsa.rdf"> 0015 <title>Debian Security</title> 0016 <link>http://security.debian.org/</link> 0017 <description> 0018 Debian Security Advisories 0019 </description> 0020 <dc:date>2006-03-18T02:46:35+00:00</dc:date> 0021 <items> 0022 <rdf:Seq> 0023 <rdf:li resource="http://www.debian.org/security/2006/dsa-1008" /> 0024 </rdf:Seq> 0025 </items> 0026 </channel> 0027 <item rdf:about="http://www.debian.org/security/2006/dsa-1008"> 0028 <title>DSA-1008 kdegraphics - buffer overflow</title> 0029 <link>http://www.debian.org/security/2006/dsa-1008</link> 0030 <description> 0031 <p>Marcelo Ricardo Leitner noticed that the current patch in DSA 932 0032 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627">CVE-2005-3627</a>) for kpdf, the PDF viewer for KDE, does not fix all 0033 buffer overflows, still allowing an attacker to execute arbitrary 0034 code.</p> 0035 </description> 0036 <dc:date>2006-03-17</dc:date> 0037 </item> 0038 </rdf:RDF>