[Secure-testing-commits] r2459 - in website: . DTSA

Joey Hess joeyh at costa.debian.org
Wed Oct 19 22:57:35 UTC 2005


Author: joeyh
Date: 2005-10-19 22:57:32 +0000 (Wed, 19 Oct 2005)
New Revision: 2459

Modified:
   website/DTSA/DTSA-1-1.html
   website/DTSA/DTSA-10-1.html
   website/DTSA/DTSA-11-1.html
   website/DTSA/DTSA-12-1.html
   website/DTSA/DTSA-13-1.html
   website/DTSA/DTSA-14-1.html
   website/DTSA/DTSA-15-1.html
   website/DTSA/DTSA-16-1.html
   website/DTSA/DTSA-17-1.html
   website/DTSA/DTSA-19-1.html
   website/DTSA/DTSA-2-1.html
   website/DTSA/DTSA-20-1.html
   website/DTSA/DTSA-3-1.html
   website/DTSA/DTSA-4-1.html
   website/DTSA/DTSA-5-1.html
   website/DTSA/DTSA-7-1.html
   website/DTSA/DTSA-8-2.html
   website/DTSA/DTSA-9-1.html
   website/index.html
Log:
update website to use only CVE references


Modified: website/DTSA/DTSA-1-1.html
===================================================================
--- website/DTSA/DTSA-1-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-1-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,19 +50,19 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2626'>CAN-2005-2626</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2627'>CAN-2005-2627</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2626'>CVE-2005-2626</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2627'>CVE-2005-2627</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Multiple security holes have been discovered in kismet:&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2627&nbsp;<br>
+CVE-2005-2627&nbsp;<br>
 &nbsp;<br>
 Multiple integer underflows in Kismet allow remote attackers to execute&nbsp;<br>
 arbitrary code via (1) kernel headers in a pcap file or (2) data frame&nbsp;<br>
 dissection, which leads to heap-based buffer overflows.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2626&nbsp;<br>
+CVE-2005-2626&nbsp;<br>
 &nbsp;<br>
 Unspecified vulnerability in Kismet allows remote attackers to have an&nbsp;<br>
 unknown impact via unprintable characters in the SSID.&nbsp;<br>

Modified: website/DTSA/DTSA-10-1.html
===================================================================
--- website/DTSA/DTSA-10-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-10-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,7 +50,7 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491'>CAN-2005-2491</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491'>CVE-2005-2491</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>An integer overflow in pcre_compile.c in Perl Compatible Regular Expressions&nbsp;<br>

Modified: website/DTSA/DTSA-11-1.html
===================================================================
--- website/DTSA/DTSA-11-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-11-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,7 +50,7 @@
 <dd>Yes<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2655'>CAN-2005-2655</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2655'>CVE-2005-2655</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>The lockmail binary shipped with maildrop allows for an attacker to&nbsp;<br>

Modified: website/DTSA/DTSA-12-1.html
===================================================================
--- website/DTSA/DTSA-12-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-12-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,7 +50,7 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2368'>CAN-2005-2368</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2368'>CVE-2005-2368</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>vim modelines allow files to execute arbitrary commands via shell&nbsp;<br>

Modified: website/DTSA/DTSA-13-1.html
===================================================================
--- website/DTSA/DTSA-13-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-13-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,20 +50,20 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2549'>CAN-2005-2549</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2550'>CAN-2005-2550</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2549'>CVE-2005-2549</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2550'>CVE-2005-2550</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Multiple vulnerabilities were discovered in evolution:&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2549&nbsp;<br>
+CVE-2005-2549&nbsp;<br>
 &nbsp;<br>
 Multiple format string vulnerabilities in Evolution allow remote attackers&nbsp;<br>
 to cause a denial of service (crash) and possibly execute arbitrary code via&nbsp;<br>
 (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task&nbsp;<br>
 list data from remote servers.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2550&nbsp;<br>
+CVE-2005-2550&nbsp;<br>
 &nbsp;<br>
 Format string vulnerability in Evolution allows remote attackers to cause a&nbsp;<br>
 denial of service (crash) and possibly execute arbitrary code via the&nbsp;<br>

Modified: website/DTSA/DTSA-14-1.html
===================================================================
--- website/DTSA/DTSA-14-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-14-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,16 +50,16 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0718'>CAN-2004-0718</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1937'>CAN-2005-1937</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2260'>CAN-2005-2260</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2261'>CAN-2005-2261</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2263'>CAN-2005-2263</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2265'>CAN-2005-2265</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2266'>CAN-2005-2266</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2268'>CAN-2005-2268</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2269'>CAN-2005-2269</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2270'>CAN-2005-2270</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0718'>CVE-2004-0718</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1937'>CVE-2005-1937</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2260'>CVE-2005-2260</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2261'>CVE-2005-2261</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2263'>CVE-2005-2263</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2265'>CVE-2005-2265</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2266'>CVE-2005-2266</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2268'>CVE-2005-2268</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2269'>CVE-2005-2269</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2270'>CVE-2005-2270</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Several problems have been discovered in Mozilla. Since the usual praxis of&nbsp;<br>
@@ -68,49 +68,49 @@
 named 1.7.8.  The Common Vulnerabilities and Exposures project identifies the&nbsp;<br>
 following problems:&nbsp;<br>
 &nbsp;<br>
-CAN-2004-0718, CAN-2005-1937&nbsp;<br>
+CVE-2004-0718, CVE-2005-1937&nbsp;<br>
 &nbsp;<br>
 A vulnerability has been discovered in Mozilla that allows remote&nbsp;<br>
 attackers to inject arbitrary Javascript from one page into the&nbsp;<br>
 frameset of another site.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2260&nbsp;<br>
+CVE-2005-2260&nbsp;<br>
 &nbsp;<br>
 The browser user interface does not properly distinguish between&nbsp;<br>
 user-generated events and untrusted synthetic events, which makes&nbsp;<br>
 it easier for remote attackers to perform dangerous actions that&nbsp;<br>
 normally could only be performed manually by the user.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2261&nbsp;<br>
+CVE-2005-2261&nbsp;<br>
 &nbsp;<br>
 XML scripts ran even when Javascript disabled.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2263&nbsp;<br>
+CVE-2005-2263&nbsp;<br>
 &nbsp;<br>
 It is possible for a remote attacker to execute a callback&nbsp;<br>
 function in the context of another domain (i.e. frame).&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2265&nbsp;<br>
+CVE-2005-2265&nbsp;<br>
 &nbsp;<br>
 Missing input sanitising of InstallVersion.compareTo() can cause&nbsp;<br>
 the application to crash.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2266&nbsp;<br>
+CVE-2005-2266&nbsp;<br>
 &nbsp;<br>
 Remote attackers could steal sensitive information such as cookies&nbsp;<br>
 and passwords from web sites by accessing data in alien frames.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2268&nbsp;<br>
+CVE-2005-2268&nbsp;<br>
 &nbsp;<br>
 It is possible for a Javascript dialog box to spoof a dialog box&nbsp;<br>
 from a trusted site and facilitates phishing attacks.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2269&nbsp;<br>
+CVE-2005-2269&nbsp;<br>
 &nbsp;<br>
 Remote attackers could modify certain tag properties of DOM nodes&nbsp;<br>
 that could lead to the execution of arbitrary script or code.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2270&nbsp;<br>
+CVE-2005-2270&nbsp;<br>
 &nbsp;<br>
 The Mozilla browser family does not properly clone base objects,&nbsp;<br>
 which allows remote attackers to execute arbitrary code.&nbsp;<br>

Modified: website/DTSA/DTSA-15-1.html
===================================================================
--- website/DTSA/DTSA-15-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-15-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,9 +50,9 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1751'>CAN-2005-1751</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921'>CAN-2005-1921</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498'>CAN-2005-2498</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1751'>CVE-2005-1751</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1921'>CVE-2005-1921</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2498'>CVE-2005-2498</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Several security related problems have been found in PHP4, the&nbsp;<br>
@@ -60,20 +60,20 @@
 Vulnerabilities and Exposures project identifies the following&nbsp;<br>
 problems:&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1751&nbsp;<br>
+CVE-2005-1751&nbsp;<br>
 &nbsp;<br>
 Eric Romang discovered insecure temporary files in the shtool&nbsp;<br>
 utility shipped with PHP that can exploited by a local attacker to&nbsp;<br>
 overwrite arbitrary files.  Only this vulnerability affects&nbsp;<br>
 packages in oldstable.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1921&nbsp;<br>
+CVE-2005-1921&nbsp;<br>
 &nbsp;<br>
 GulfTech has discovered that PEAR XML_RPC is vulnerable to a&nbsp;<br>
 remote PHP code execution vulnerability that may allow an attacker&nbsp;<br>
 to compromise a vulnerable server.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2498&nbsp;<br>
+CVE-2005-2498&nbsp;<br>
 &nbsp;<br>
 Stefan Esser discovered another vulnerability in the XML-RPC&nbsp;<br>
 libraries that allows injection of arbitrary PHP code into eval()&nbsp;<br>

Modified: website/DTSA/DTSA-16-1.html
===================================================================
--- website/DTSA/DTSA-16-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-16-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,57 +50,57 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2098'>CAN-2005-2098</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2099'>CAN-2005-2099</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2456'>CAN-2005-2456</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2617'>CAN-2005-2617</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1913'>CAN-2005-1913</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1761'>CAN-2005-1761</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2457'>CAN-2005-2457</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2458'>CAN-2005-2458</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2459'>CAN-2005-2459</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2548'>CAN-2005-2548</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302'>CAN-2004-2302</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1765'>CAN-2005-1765</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1762'>CAN-2005-1762</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1761'>CAN-2005-1761</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2555'>CAN-2005-2555</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2098'>CVE-2005-2098</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2099'>CVE-2005-2099</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456'>CVE-2005-2456</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2617'>CVE-2005-2617</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1913'>CVE-2005-1913</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1761'>CVE-2005-1761</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457'>CVE-2005-2457</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458'>CVE-2005-2458</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459'>CVE-2005-2459</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2548'>CVE-2005-2548</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2302'>CVE-2004-2302</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1765'>CVE-2005-1765</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1762'>CVE-2005-1762</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1761'>CVE-2005-1761</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555'>CVE-2005-2555</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Several security related problems have been found in version 2.6 of the&nbsp;<br>
 linux kernel. The Common Vulnerabilities and Exposures project identifies&nbsp;<br>
 the following problems:&nbsp;<br>
 &nbsp;<br>
-CAN-2004-2302&nbsp;<br>
+CVE-2004-2302&nbsp;<br>
 &nbsp;<br>
   Race condition in the sysfs_read_file and sysfs_write_file functions in&nbsp;<br>
   Linux kernel before 2.6.10 allows local users to read kernel memory and&nbsp;<br>
   cause a denial of service (crash) via large offsets in sysfs files.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1761&nbsp;<br>
+CVE-2005-1761&nbsp;<br>
 &nbsp;<br>
   Vulnerability in the Linux kernel allows local users to cause a&nbsp;<br>
   denial of service (kernel crash) via ptrace.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1762&nbsp;<br>
+CVE-2005-1762&nbsp;<br>
 &nbsp;<br>
   The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64&nbsp;<br>
   platform allows local users to cause a denial of service (kernel crash) via&nbsp;<br>
   a "non-canonical" address.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1765&nbsp;<br>
+CVE-2005-1765&nbsp;<br>
 &nbsp;<br>
   syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when&nbsp;<br>
   running in 32-bit compatibility mode, allows local users to cause a denial&nbsp;<br>
   of service (kernel hang) via crafted arguments.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1913&nbsp;<br>
+CVE-2005-1913&nbsp;<br>
 &nbsp;<br>
   When a non group-leader thread called exec() to execute a different program&nbsp;<br>
   while an itimer was pending, the timer expiry would signal the old group&nbsp;<br>
   leader task, which did not exist any more. This caused a kernel panic.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2098 &nbsp;<br>
+CVE-2005-2098 &nbsp;<br>
 &nbsp;<br>
   The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before&nbsp;<br>
   2.6.12.5 contains an error path that does not properly release the session&nbsp;<br>
@@ -109,7 +109,7 @@
   empty name string, (2) with a long name string, (3) with the key quota&nbsp;<br>
   reached, or (4) ENOMEM.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2099&nbsp;<br>
+CVE-2005-2099&nbsp;<br>
 &nbsp;<br>
   The Linux kernel before 2.6.12.5 does not properly destroy a keyring that&nbsp;<br>
   is not instantiated properly, which allows local users or remote attackers&nbsp;<br>
@@ -117,7 +117,7 @@
   that is not empty, which causes the creation to fail, leading to a null&nbsp;<br>
   dereference in the keyring destructor.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2456&nbsp;<br>
+CVE-2005-2456&nbsp;<br>
 &nbsp;<br>
   Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c&nbsp;<br>
   in Linux kernel 2.6 allows local users to cause a denial of service (oops&nbsp;<br>
@@ -125,41 +125,41 @@
   larger than XFRM_POLICY_OUT, which is used as an index in the&nbsp;<br>
   sock->sk_policy array.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2457&nbsp;<br>
+CVE-2005-2457&nbsp;<br>
 &nbsp;<br>
   The driver for compressed ISO file systems (zisofs) in the Linux kernel&nbsp;<br>
   before 2.6.12.5 allows local users and remote attackers to cause a denial&nbsp;<br>
   of service (kernel crash) via a crafted compressed ISO file system.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2458&nbsp;<br>
+CVE-2005-2458&nbsp;<br>
 &nbsp;<br>
   inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows&nbsp;<br>
   remote attackers to cause a denial of service (kernel crash) via a&nbsp;<br>
   compressed file with "improper tables".&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2459&nbsp;<br>
+CVE-2005-2459&nbsp;<br>
 &nbsp;<br>
   The huft_build function in inflate.c in the zlib routines in the Linux&nbsp;<br>
   kernel before 2.6.12.5 returns the wrong value, which allows remote&nbsp;<br>
   attackers to cause a denial of service (kernel crash) via a certain&nbsp;<br>
   compressed file that leads to a null pointer dereference, a different&nbsp;<br>
-  vulnerbility than CAN-2005-2458.&nbsp;<br>
+  vulnerbility than CVE-2005-2458.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2548&nbsp;<br>
+CVE-2005-2548&nbsp;<br>
 &nbsp;<br>
   vlan_dev.c in Linux kernel 2.6.8 allows remote attackers to cause a denial&nbsp;<br>
   of service (kernel oops from null dereference) via certain UDP packets that&nbsp;<br>
   lead to a function call with the wrong argument, as demonstrated using&nbsp;<br>
   snmpwalk on snmpd.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2555&nbsp;<br>
+CVE-2005-2555&nbsp;<br>
 &nbsp;<br>
   Linux kernel 2.6.x does not properly restrict socket policy access to users&nbsp;<br>
   with the CAP_NET_ADMIN capability, which could allow local users to conduct&nbsp;<br>
   unauthorized activities via (1) ipv4/ip_sockglue.c and (2)&nbsp;<br>
   ipv6/ipv6_sockglue.c.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2617&nbsp;<br>
+CVE-2005-2617&nbsp;<br>
 &nbsp;<br>
   The syscall32_setup_pages function in syscall32.c for Linux kernel 2.6.12&nbsp;<br>
   and later, on the amd64 architecture, does not check the return value of&nbsp;<br>

Modified: website/DTSA/DTSA-17-1.html
===================================================================
--- website/DTSA/DTSA-17-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-17-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,7 +50,7 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2672'>CAN-2005-2672</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2672'>CVE-2005-2672</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Javier Fernández-Sanguino Peña discovered that a script included in&nbsp;<br>

Modified: website/DTSA/DTSA-19-1.html
===================================================================
--- website/DTSA/DTSA-19-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-19-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,17 +50,17 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2919'>CAN-2005-2919</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2920'>CAN-2005-2920</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2919'>CVE-2005-2919</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2920'>CVE-2005-2920</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Multiple security holes were found in clamav:&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2919&nbsp;<br>
+CVE-2005-2919&nbsp;<br>
 &nbsp;<br>
   A possible infinate loop has been discovered in libclamav/fsg.c&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2920&nbsp;<br>
+CVE-2005-2920&nbsp;<br>
 &nbsp;<br>
   A possible buffer overflow has been found in libclamav/upx.c&nbsp;<br>
 &nbsp;<br>

Modified: website/DTSA/DTSA-2-1.html
===================================================================
--- website/DTSA/DTSA-2-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-2-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,33 +50,33 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2448'>CAN-2005-2448</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2370'>CAN-2005-2370</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2369'>CAN-2005-2369</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1914'>CAN-2005-1914</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2448'>CVE-2005-2448</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2370'>CVE-2005-2370</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2369'>CVE-2005-2369</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1914'>CVE-2005-1914</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>centericq in testing is vulnerable to multiple security holes:&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2448&nbsp;<br>
+CVE-2005-2448&nbsp;<br>
 &nbsp;<br>
 Multiple endianness errors in libgadu, which is embedded in centericq,&nbsp;<br>
 allow remote attackers to cause a denial of service (invalid behaviour in&nbsp;<br>
 applications) on big-endian systems.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2370&nbsp;<br>
+CVE-2005-2370&nbsp;<br>
 &nbsp;<br>
 Multiple memory alignment errors in libgadu, which is embedded in&nbsp;<br>
 centericq, allows remote attackers to cause a denial of service (bus error)&nbsp;<br>
 on certain architectures such as SPARC via an incoming message.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2369&nbsp;<br>
+CVE-2005-2369&nbsp;<br>
 &nbsp;<br>
 Multiple integer signedness errors in libgadu, which is embedded in&nbsp;<br>
 centericq, may allow remote attackers to cause a denial of service&nbsp;<br>
 or execute arbitrary code.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1914&nbsp;<br>
+CVE-2005-1914&nbsp;<br>
 &nbsp;<br>
 centericq creates temporary files with predictable file names, which&nbsp;<br>
 allows local users to overwrite arbitrary files via a symlink attack.&nbsp;<br>

Modified: website/DTSA/DTSA-20-1.html
===================================================================
--- website/DTSA/DTSA-20-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-20-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,12 +50,12 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2878'>CAN-2005-2878</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2878'>CVE-2005-2878</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>A format string vulnerability has been discovered in Mailutils.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2878&nbsp;<br>
+CVE-2005-2878&nbsp;<br>
   A format string vulnerability in search.c in the imap4d server in GNU&nbsp;<br>
   Mailutils 0.6 allows remote authenticated users to execute arbitrary code via&nbsp;<br>
   format string specifiers in the SEARCH command.&nbsp;<br>

Modified: website/DTSA/DTSA-3-1.html
===================================================================
--- website/DTSA/DTSA-3-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-3-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,42 +50,42 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2070'>CAN-2005-2070</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1923'>CAN-2005-1923</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2056'>CAN-2005-2056</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1922'>CAN-2005-1922</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2450'>CAN-2005-2450</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2070'>CVE-2005-2070</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1923'>CVE-2005-1923</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2056'>CVE-2005-2056</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1922'>CVE-2005-1922</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2450'>CVE-2005-2450</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Multiple security holes were found in clamav:&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2070&nbsp;<br>
+CVE-2005-2070&nbsp;<br>
 &nbsp;<br>
 The ClamAV Mail fILTER (clamav-milter), when used in Sendmail using long&nbsp;<br>
 timeouts, allows remote attackers to cause a denial of service by keeping&nbsp;<br>
 an open connection, which prevents ClamAV from reloading.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1923&nbsp;<br>
+CVE-2005-1923&nbsp;<br>
 &nbsp;<br>
 The ENSURE_BITS macro in mszipd.c for Clam AntiVirus (ClamAV) allows remote&nbsp;<br>
 attackers to cause a denial of service (CPU consumption by infinite loop)&nbsp;<br>
 via a cabinet (CAB) file with the cffile_FolderOffset field set to 0xff,&nbsp;<br>
 which causes a zero-length read.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2056&nbsp;<br>
+CVE-2005-2056&nbsp;<br>
 &nbsp;<br>
 The Quantum archive decompressor in Clam AntiVirus (ClamAV) allows remote&nbsp;<br>
 attackers to cause a denial of service (application crash) via a crafted&nbsp;<br>
 Quantum archive.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1922&nbsp;<br>
+CVE-2005-1922&nbsp;<br>
 &nbsp;<br>
 The MS-Expand file handling in Clam AntiVirus (ClamAV) allows remote&nbsp;<br>
 attackers to cause a denial of service (file descriptor and memory&nbsp;<br>
 consumption) via a crafted file that causes repeated errors in the&nbsp;<br>
 cli_msexpand function.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2450&nbsp;<br>
+CVE-2005-2450&nbsp;<br>
 &nbsp;<br>
 Multiple integer overflows in the (1) TNEF, (2) CHM, or (3) FSG file&nbsp;<br>
 format processors in libclamav for Clam AntiVirus (ClamAV) allow remote&nbsp;<br>

Modified: website/DTSA/DTSA-4-1.html
===================================================================
--- website/DTSA/DTSA-4-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-4-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,38 +50,38 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1916'>CAN-2005-1916</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1851'>CAN-2005-1851</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1850'>CAN-2005-1850</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852'>CAN-2005-1852</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2448'>CAN-2005-2448</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1916'>CVE-2005-1916</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1851'>CVE-2005-1851</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1850'>CVE-2005-1850</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1852'>CVE-2005-1852</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2448'>CVE-2005-2448</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Multiple vulnerabilities were discovered in ekg:&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1916&nbsp;<br>
+CVE-2005-1916&nbsp;<br>
 &nbsp;<br>
 Eric Romang discovered insecure temporary file creation and arbitrary&nbsp;<br>
 command execution in a contributed script that can be exploited by a local&nbsp;<br>
 attacker.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1851&nbsp;<br>
+CVE-2005-1851&nbsp;<br>
 &nbsp;<br>
 Marcin Owsiany and Wojtek Kaniewski discovered potential shell command&nbsp;<br>
 injection in a contributed script.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1850&nbsp;<br>
+CVE-2005-1850&nbsp;<br>
 &nbsp;<br>
 Marcin Owsiany and Wojtek Kaniewski discovered insecure temporary file&nbsp;<br>
 creation in contributed scripts.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-1852&nbsp;<br>
+CVE-2005-1852&nbsp;<br>
 &nbsp;<br>
 Multiple integer overflows in libgadu, as used in ekg, allows remote&nbsp;<br>
 attackers to cause a denial of service (crash) and possibly execute&nbsp;<br>
 arbitrary code via an incoming message.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2448&nbsp;<br>
+CVE-2005-2448&nbsp;<br>
 &nbsp;<br>
 Multiple endianness errors in libgadu in ekg allow remote attackers to&nbsp;<br>
 cause a denial of service (invalid behaviour in applications) on&nbsp;<br>

Modified: website/DTSA/DTSA-5-1.html
===================================================================
--- website/DTSA/DTSA-5-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-5-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,26 +50,26 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2102'>CAN-2005-2102</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2370'>CAN-2005-2370</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2103'>CAN-2005-2103</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2102'>CVE-2005-2102</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2370'>CVE-2005-2370</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2103'>CVE-2005-2103</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>Multiple security holes were found in gaim:&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2102&nbsp;<br>
+CVE-2005-2102&nbsp;<br>
 &nbsp;<br>
 The AIM/ICQ module in Gaim allows remote attackers to cause a denial of&nbsp;<br>
 service (application crash) via a filename that contains invalid UTF-8&nbsp;<br>
 characters.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2370&nbsp;<br>
+CVE-2005-2370&nbsp;<br>
 &nbsp;<br>
 Multiple memory alignment errors in libgadu, as used in gaim and other&nbsp;<br>
 packages, allow remote attackers to cause a denial of service (bus error)&nbsp;<br>
 on certain architectures such as SPARC via an incoming message.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2103&nbsp;<br>
+CVE-2005-2103&nbsp;<br>
 &nbsp;<br>
 Buffer overflow in the AIM and ICQ module in Gaim allows remote attackers&nbsp;<br>
 to cause a denial of service (application crash) and possibly execute&nbsp;<br>

Modified: website/DTSA/DTSA-7-1.html
===================================================================
--- website/DTSA/DTSA-7-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-7-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,8 +50,8 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0718'>CAN-2004-0718</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1937'>CAN-2005-1937</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0718'>CVE-2004-0718</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1937'>CVE-2005-1937</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>A vulnerability has been discovered in Mozilla that allows remote attackers&nbsp;<br>

Modified: website/DTSA/DTSA-8-2.html
===================================================================
--- website/DTSA/DTSA-8-2.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-8-2.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,19 +50,19 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0718'>CAN-2004-0718</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1937'>CAN-2005-1937</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2260'>CAN-2005-2260</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2261'>CAN-2005-2261</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2262'>CAN-2005-2262</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2263'>CAN-2005-2263</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2264'>CAN-2005-2264</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2265'>CAN-2005-2265</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2266'>CAN-2005-2266</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2267'>CAN-2005-2267</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2268'>CAN-2005-2268</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2269'>CAN-2005-2269</a> 
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2270'>CAN-2005-2270</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0718'>CVE-2004-0718</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1937'>CVE-2005-1937</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2260'>CVE-2005-2260</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2261'>CVE-2005-2261</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2262'>CVE-2005-2262</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2263'>CVE-2005-2263</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2264'>CVE-2005-2264</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2265'>CVE-2005-2265</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2266'>CVE-2005-2266</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2267'>CVE-2005-2267</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2268'>CVE-2005-2268</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2269'>CVE-2005-2269</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2270'>CVE-2005-2270</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>We experienced that the update for Mozilla Firefox from DTSA-8-1&nbsp;<br>
@@ -74,65 +74,65 @@
 &nbsp;<br>
 Several problems were discovered in Mozilla Firefox:&nbsp;<br>
 &nbsp;<br>
-CAN-2004-0718 CAN-2005-1937&nbsp;<br>
+CVE-2004-0718 CVE-2005-1937&nbsp;<br>
 &nbsp;<br>
 A vulnerability has been discovered in Mozilla Firefox that allows remote&nbsp;<br>
 attackers to inject arbitrary Javascript from one page into the frameset of&nbsp;<br>
 another site.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2260&nbsp;<br>
+CVE-2005-2260&nbsp;<br>
 &nbsp;<br>
 The browser user interface does not properly distinguish between&nbsp;<br>
 user-generated events and untrusted synthetic events, which makes it easier&nbsp;<br>
 for remote attackers to perform dangerous actions that normally could only be&nbsp;<br>
 performed manually by the user.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2261&nbsp;<br>
+CVE-2005-2261&nbsp;<br>
 &nbsp;<br>
 XML scripts ran even when Javascript disabled.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2262&nbsp;<br>
+CVE-2005-2262&nbsp;<br>
 &nbsp;<br>
 The user can be tricked to executing arbitrary JavaScript code by using a&nbsp;<br>
 JavaScript URL as wallpaper.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2263&nbsp;<br>
+CVE-2005-2263&nbsp;<br>
 &nbsp;<br>
 It is possible for a remote attacker to execute a callback function in the&nbsp;<br>
 context of another domain (i.e. frame).&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2264&nbsp;<br>
+CVE-2005-2264&nbsp;<br>
 &nbsp;<br>
 By opening a malicious link in the sidebar it is possible for remote&nbsp;<br>
 attackers to steal sensitive information.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2265&nbsp;<br>
+CVE-2005-2265&nbsp;<br>
 &nbsp;<br>
 Missing input sanitising of InstallVersion.compareTo() can cause the&nbsp;<br>
 application to crash.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2266&nbsp;<br>
+CVE-2005-2266&nbsp;<br>
 &nbsp;<br>
 Remote attackers could steal sensitive information such as cookies and&nbsp;<br>
 passwords from web sites by accessing data in alien frames.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2267&nbsp;<br>
+CVE-2005-2267&nbsp;<br>
 &nbsp;<br>
 By using standalone applications such as Flash and QuickTime to open a&nbsp;<br>
 javascript: URL, it is possible for a remote attacker to steal sensitive&nbsp;<br>
 information and possibly execute arbitrary code.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2268&nbsp;<br>
+CVE-2005-2268&nbsp;<br>
 &nbsp;<br>
 It is possible for a Javascript dialog box to spoof a dialog box from a&nbsp;<br>
 trusted site and facilitates phishing attacks.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2269&nbsp;<br>
+CVE-2005-2269&nbsp;<br>
 &nbsp;<br>
 Remote attackers could modify certain tag properties of DOM nodes that could&nbsp;<br>
 lead to the execution of arbitrary script or code.&nbsp;<br>
 &nbsp;<br>
-CAN-2005-2270&nbsp;<br>
+CVE-2005-2270&nbsp;<br>
 &nbsp;<br>
 The Mozilla browser family does not properly clone base objects, which allows&nbsp;<br>
 remote attackers to execute arbitrary code.&nbsp;<br>

Modified: website/DTSA/DTSA-9-1.html
===================================================================
--- website/DTSA/DTSA-9-1.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/DTSA/DTSA-9-1.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -50,7 +50,7 @@
 <dd>No<br></dd>
 <dt>CVE:</dt>
 <dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2547'>CAN-2005-2547</a> 
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2547'>CVE-2005-2547</a> 
 <br></dd>
 <br><dt>More information:</dt>
 <dd>A bug in bluez-utils allows remote attackers to execute arbitrary commands&nbsp;<br>

Modified: website/index.html
===================================================================
--- website/index.html	2005-10-19 22:54:03 UTC (rev 2458)
+++ website/index.html	2005-10-19 22:57:32 UTC (rev 2459)
@@ -92,7 +92,7 @@
 
 	<p>
 	The team maintains a database (actually some files) that contain
-	our notes about all CVEs, CANs, and DSAs. This database is available
+	our notes about all CVEs and DSAs. This database is available
 	<a href="http://svn.debian.org/wsvn/secure-testing">from subversion</a>,
 	and may be checked out from
 	<tt>svn://svn.debian.org/secure-testing/</tt>.
@@ -191,7 +191,7 @@
 		then check the <a href="logs/dtsasync">log file</a> and/or
 		upgrade a test machine.</li>
 		<li>cd data/DTSA; ./sndadvisory DTSA-n-1</li>
-		<li>Edit CAN/list and DSA/list to list the version of the
+		<li>Edit CVE/list and DSA/list to list the version of the
 		package that is in the secure-testing archive as fixing the
 		holes. This is unfortunatly currently necessary for the fix to
 		appear as a fix on the tracking page.</li>




More information about the Secure-testing-commits mailing list