Warning, /frameworks/syndication/autotests/rdf/security_debian.rdf.xml is written in an unsupported language. File is not indexed.

0001 <?xml version="1.0" encoding="iso-8859-1"?>
0002 <?xml-stylesheet href="dsa-rdf.css" type="text/css"?>
0003 <rdf:RDF
0004   xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
0005   xmlns="http://purl.org/rss/1.0/"
0006   xmlns:dc="http://purl.org/dc/elements/1.1/"
0007   xml:lang="en"
0008 >
0009 <!-- source: http://security.debian.org/
0010      properties:
0011      - description: escaped HTML
0012      - dc:date: short date-only version
0013 -->
0014 <channel rdf:about="http://www.debian.org/security/dsa.rdf">
0015   <title>Debian Security</title>
0016   <link>http://security.debian.org/</link>
0017   <description>
0018 Debian Security Advisories
0019   </description>
0020   <dc:date>2006-03-18T02:46:35+00:00</dc:date>
0021   <items>
0022     <rdf:Seq>
0023 <rdf:li resource="http://www.debian.org/security/2006/dsa-1008" />
0024     </rdf:Seq>
0025   </items>
0026 </channel>
0027 <item rdf:about="http://www.debian.org/security/2006/dsa-1008">
0028   <title>DSA-1008 kdegraphics - buffer overflow</title>
0029   <link>http://www.debian.org/security/2006/dsa-1008</link>
0030   <description>
0031 &lt;p&gt;Marcelo Ricardo Leitner noticed that the current patch in DSA 932
0032 (&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627&quot;&gt;CVE-2005-3627&lt;/a&gt;) for kpdf, the PDF viewer for KDE, does not fix all
0033 buffer overflows, still allowing an attacker to execute arbitrary
0034 code.&lt;/p&gt;
0035   </description>
0036   <dc:date>2006-03-17</dc:date>
0037 </item>
0038 </rdf:RDF>