[Openvas-commits] r3452 - in trunk/openvas-plugins: . extra/lsc_generator extra/lsc_generator/common extra/lsc_generator/parser extra/lsc_generator/templates extra/lsc_generator/test extra/lsc_generator/test/unit_test extra/lsc_generator/test/unit_test/work/input

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed May 20 16:24:40 CEST 2009


Author: chandra
Date: 2009-05-20 16:24:39 +0200 (Wed, 20 May 2009)
New Revision: 3452

Added:
   trunk/openvas-plugins/extra/lsc_generator/parser/gentoo.py
   trunk/openvas-plugins/extra/lsc_generator/templates/Gentoo.template
   trunk/openvas-plugins/extra/lsc_generator/test/unit_test/test_gentoo.py
   trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/gentoo-advisory-main.html
   trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200703-23.html
   trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200704-13.html
   trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200804-30.html
   trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200903-37.html
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/extra/lsc_generator/LSCGenerator.py
   trunk/openvas-plugins/extra/lsc_generator/README
   trunk/openvas-plugins/extra/lsc_generator/common/generate_script.py
   trunk/openvas-plugins/extra/lsc_generator/lsc.conf
   trunk/openvas-plugins/extra/lsc_generator/lsc_unit_test.py
   trunk/openvas-plugins/extra/lsc_generator/parser/__init__.py
   trunk/openvas-plugins/extra/lsc_generator/test/sanity_test.py
   trunk/openvas-plugins/extra/lsc_generator/test/unit_test/__init__.py
   trunk/openvas-plugins/extra/lsc_generator/test/unit_test/test_hpux.py
Log:
Added Gentoo support for LSC Generator

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/ChangeLog	2009-05-20 14:24:39 UTC (rev 3452)
@@ -1,4 +1,24 @@
 2009-05-20 Chandrashekhar B <bchandra at secpod.com>
+	* extra/lsc_generator/test/sanity_test.py,
+	extra/lsc_generator/test/unit_test/test_gentoo.py,
+	extra/lsc_generator/test/unit_test/work/input/glsa-200804-30.html,
+	extra/lsc_generator/test/unit_test/work/input/glsa-200704-13.html,
+	extra/lsc_generator/test/unit_test/work/input/glsa-200703-23.html,
+	extra/lsc_generator/test/unit_test/work/input/glsa-200903-37.html,
+	extra/lsc_generator/test/unit_test/work/input/gentoo-advisory-main.html,
+	extra/lsc_generator/test/unit_test/__init__.py,
+	extra/lsc_generator/test/unit_test/test_hpux.py,
+	extra/lsc_generator/LSCGenerator.py,
+	extra/lsc_generator/lsc.conf,
+	extra/lsc_generator/lsc_unit_test.py,
+	extra/lsc_generator/common/generate_script.py,
+	extra/lsc_generator/parser/gentoo.py,
+	extra/lsc_generator/parser/__init__.py,
+	extra/lsc_generator/README,
+	extra/lsc_generator/templates/Gentoo.template:
+	Added Gentoo support for LSC generator
+
+2009-05-20 Chandrashekhar B <bchandra at secpod.com>
 	* scripts/secpod_ms_iis_webdav_auth_bypass_vuln.nasl,
 	scripts/secpod_sdp_downloader_bof_vuln.nasl,
 	scripts/secpod_opensc_insecure_key_generation_vuln.nasl,

Modified: trunk/openvas-plugins/extra/lsc_generator/LSCGenerator.py
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/LSCGenerator.py	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/LSCGenerator.py	2009-05-20 14:24:39 UTC (rev 3452)
@@ -63,6 +63,7 @@
         'Ubuntu'  : (ubuntu, 'Ubuntu'),
         'Mandriva'  : (mandriva, 'Mandriva'),
         'Hpux'  : (hp_ux, 'HPUX'),
+        'Gentoo'  : (gentoo, 'Gentoo'),
     }
 
 

Modified: trunk/openvas-plugins/extra/lsc_generator/README
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/README	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/README	2009-05-20 14:24:39 UTC (rev 3452)
@@ -16,6 +16,7 @@
 - Debian
 - Ubuntu
 - Mandriva
+- Gentoo
 
 Support for other Operating Systems is underway. This can be achieved by
 implementing a parser for that particular vendor advisory and interfacing
@@ -42,6 +43,7 @@
 |   |-- mandriva.py - Mandriva advisory parser
 |   |-- redhat.py - RedHat advisory parser
 |   `-- ubuntu.py - Ubunutu advisory parser
+|   `-- gentoo.py - Gentoo advisory parser
 |-- report
 |   |-- __init__.py
 |   `-- mantisreporter.py - Report the tasks in Mantis
@@ -53,6 +55,7 @@
 |   |-- Mandriva.template - Mandriva NVT skeleton code
 |   |-- RedHat.template - RedHat NVT skeleton code
 |   `-- Ubuntu.template - Ubuntu NVT skeleton code
+|   `-- Gentoo.template - Gentoo NVT skeleton code
 `-- test - Unit and sanity testing
     |-- __init__.py
     `-- sanity_test.py - Sanity test module
@@ -71,6 +74,7 @@
         |-- test_suse.py
         |-- test_ubuntu.py
         |-- test_utils.py
+	|-- test_gentoo.py
         `-- work - Workspace for unit test
             |-- input
             `-- output
@@ -163,3 +167,6 @@
 
 Revision 1.4:
 - Parser for all versions of Mandriva
+
+Revision 1.5:
+- Parser for all versions of Gentoo

Modified: trunk/openvas-plugins/extra/lsc_generator/common/generate_script.py
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/common/generate_script.py	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/common/generate_script.py	2009-05-20 14:24:39 UTC (rev 3452)
@@ -201,6 +201,79 @@
             sys.exit(msg)
 
 
+    def generateGentooPkgCheck(self, parse, platform, debug = 0):
+        """
+        Generates Gentoo PKG verifying code
+        """
+
+        try:
+            gentoo_pkg_code = ''
+            packages = {}
+
+            if debug:
+                print "Generating Gentoo Pkg Code..."
+
+            ## Example for parse.Packages "{'All supported architectures': 
+            ## {'kde-base/kdelibs': ['lt', '4.0', 'rge', '3.5.8-r4', 'rge',
+            ## '3.5.9-r3', 'gt', '4.0', 'lt', '3.5.5', 'rge', '3.5.10-r2']}}"
+
+            if parse.Packages.has_key(platform):
+                packages = parse.Packages[platform]
+            else:
+                if debug:
+                    print "%s Platform not found in %s" %(platform, parse)
+
+            for pkgs in packages:
+                    ver_list = packages[pkgs]
+                    ## ver_list should have even number for elements,
+                    ## i.e Key Pair "le","1.2"
+                    if len(ver_list)%2 == 1:
+                        if debug:
+                            print "Something wrong in the dict : ", ver_list
+                        continue
+
+                    package = pkgs.strip()
+                    vuln_ver_list = []
+                    un_aff_list = []
+
+                    ## Create list for vulnerable and unaffected versions
+                    count = 0
+                    for i in ver_list:
+                        if not re.findall('[0-9.]+', i):
+                            if count == 0:
+                                vuln_ver_list.append(str(i + " " + \
+                                                       ver_list[count + 1]))
+                            else:
+                                un_aff_list.append(str(i + " " + \
+                                                       ver_list[count + 1]))
+
+                        count = count + 1
+
+                    if not un_aff_list:
+                        un_aff_list = [""]
+
+                    ## unaffected list may be empty, but not package and
+                    ## vulnerable version
+                    if not(package and vuln_ver_list):
+                        if debug:
+                            print "Didn't find all gentoo package "+ \
+                                      "information: ", package, vuln_ver_list
+                        continue
+
+                    gentoo_pkg_code += """
+
+if(ispkgvuln(pkg:"%s", vulnerable:%s, unaffected:%s))
+{
+  security_hole(0);
+  exit(0);
+}""" % (package, vuln_ver_list, un_aff_list)
+
+            return(gentoo_pkg_code)
+        except Exception, msg:
+            print "Exception in : GenerateCode -> generateGentooPkgCheck() method"
+            sys.exit(msg)
+
+
 class GenerateNVTLocal:
     """
     GenerateNVTLocal: NASL code generator based on the template
@@ -222,6 +295,9 @@
         '___IS_HPUX_PKG_VULN___'       : 'self.ActionObj.generateHPUXPkgCheck\
                                      (self.parse, platform, debug)',
 
+        '___IS_GENTOO_PKG_VULN___'       : 'self.ActionObj.generateGentooPkgCheck\
+                                     (self.parse, platform, debug)',
+
         '___IF_RELEASE_CLOSE___'  : 'self.ActionObj.generateClose(debug)',
     }
 

Modified: trunk/openvas-plugins/extra/lsc_generator/lsc.conf
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/lsc.conf	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/lsc.conf	2009-05-20 14:24:39 UTC (rev 3452)
@@ -90,7 +90,7 @@
 
 
 [common]
-generate = Suse , Fedora, Redhat, CentOS, Debian, Ubuntu, Mandriva,HPUX,  
+generate = Suse , Fedora, Redhat, CentOS, Debian, Ubuntu, Mandriva,HPUX, Gentoo,   
 build_path =  ./build
 
 
@@ -115,7 +115,6 @@
 template = ./templates/HPUX.template
 
 
-
 # Mandriva Core Section
 [Mandriva]
 
@@ -140,6 +139,18 @@
 template = ./templates/Ubuntu.template
 
 
+# Gentoo Core Section
+[Gentoo]
+
+startid = 845000
+
+mainurl = http://www.gentoo.org/security/en/glsa/
+
+year = 2009
+
+template = ./templates/Gentoo.template
+
+
 # Debian Core Section
 [Debian]
 

Modified: trunk/openvas-plugins/extra/lsc_generator/lsc_unit_test.py
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/lsc_unit_test.py	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/lsc_unit_test.py	2009-05-20 14:24:39 UTC (rev 3452)
@@ -5,6 +5,7 @@
 from test.unit_test import *
 
 ## Create Test Suite
+gentoo_test_suite = unittest.makeSuite(test_gentoo.GentooParserTestCase ,'test')
 hpux_test_suite = unittest.makeSuite(test_hpux.HPUXParserTestCase ,'test')
 mandriva_test_suite = unittest.makeSuite(test_mandriva.MandrivaParserTestCase ,'test')
 ubuntu_test_suite = unittest.makeSuite(test_ubuntu.UbuntuParserTestCase ,'test')
@@ -26,7 +27,7 @@
                    sanity_test_suite, generate_test_suite, mantisreporter_test_suite,
                    lsc_test_suite, fedora_test_suite, redhat_test_suite,
                    centos_test_suite, debian_test_suite, ubuntu_test_suite,
-                   mandriva_test_suite, hpux_test_suite]
+                   mandriva_test_suite, hpux_test_suite, gentoo_test_suite]
 
 runner = unittest.TextTestRunner()
 

Modified: trunk/openvas-plugins/extra/lsc_generator/parser/__init__.py
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/parser/__init__.py	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/parser/__init__.py	2009-05-20 14:24:39 UTC (rev 3452)
@@ -74,3 +74,4 @@
 import ubuntu
 import mandriva
 import hp_ux
+import gentoo

Added: trunk/openvas-plugins/extra/lsc_generator/parser/gentoo.py
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/parser/gentoo.py	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/parser/gentoo.py	2009-05-20 14:24:39 UTC (rev 3452)
@@ -0,0 +1,486 @@
+###############################################################################
+# Local Security Check Automation Framework
+#
+# Authors:
+# Veerendra GG <veerendragg at secpod.com>
+#
+# Revision 1.0
+# Date: 2009/05/20
+#
+# Copyright:
+# Copyright (c) 2009 SecPod , http://www.secpod.org
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+import re
+import os
+import sys
+
+from common import utils
+
+append_url = 'http://www.gentoo.org/security/en/glsa/'
+
+class Parser:
+    """
+    Gentoo security advisory parser, parse and populate the global variables
+    """
+
+    ## Global parse structure, initializing
+    AdvID = ''
+    Description = ''
+    Packages = {}
+    CVEs = ''
+    Name = ''
+    Summary = ''
+    Platforms = ''
+    Product = []
+    Html_content = ''
+    XREF = []
+    FileName = ''
+    total_prod_list = []
+
+
+    def _getYearLinks(self, link, year, debug=0):
+        """
+        Gets the advisory links for the given year
+        """
+        year_links = []
+        data = utils.getHTMLCon(link)
+        links = re.findall('<a href="http://security.gentoo.org/glsa/'+ \
+                                         '(glsa-' + str(year) + '.*)">', data)
+        if links:
+            links = utils.removeDups(links)
+            for i in links:
+                year_links.append(append_url + i)
+
+            if debug:
+
+                if year_links:
+                    print "Total (%s) Gentoo Security Advisories for (%s)" \
+                                         "  year: " %(len(year_links), year)
+                    print "\nGentoo Security Advisory for (%s) year" %(year)
+                    for i in year_links:
+                        print i
+
+            return year_links
+
+        return []
+
+
+    def fetchHTML(self, year, debug=0):
+        """
+        Retrive Gentoo Advisories locally
+        """
+
+        try:
+            all_adv_links = []
+
+            year_links = self._getYearLinks(self.main_url, year, debug)
+
+            if not year_links:
+                print "ERROR: Din't find Gentoo Security Advisories for "+ \
+                                                           "(%s) year" %(year)
+                print "Exiting ..."
+                sys.exit(0)
+
+            ## Remove duplicate links
+            all_adv_links = utils.removeDups(year_links)
+
+            ## Construct file name and retrive the advisory
+            for adv_url in all_adv_links:
+                base_name = adv_url.split('/')[-1]
+                file_name = self.html_cache + base_name.replace('.xml','.html')
+
+                if not os.path.isfile(file_name):
+                    if debug:
+                        print "\nFetching Gentoo Advisory..." + \
+                                         os.path.basename(adv_url)
+                    try:
+                        utils.fetchFiles(adv_url, file_name, debug)
+                    except Exception, msg:
+                        print 'ERROR: Error fething the url %s' % msg
+
+        except Exception, msg:
+            print "Exception in : gentoo -> Parser(Class) -> fetchHTML method()"
+            sys.exit(msg)
+
+
+    def _findAll(self, regex):
+        """
+        Returns Matched data
+        """
+        return regex.findall(self.Html_content, re.IGNORECASE)
+
+
+    def getCVE(self, debug=0):
+        """
+        Returns CVE list
+        """
+        if debug:
+            print "\nGetting CVE List..."
+
+        cve_regex = re.compile('CVE-[0-9]+-[0-9]+')
+        can_regex = re.compile('CAN-[0-9]+-[0-9]+')
+
+        cve_list = self._findAll(cve_regex)
+        cve_list.extend(self._findAll(can_regex))
+
+        cve_list = utils.removeDups(cve_list)
+
+        if cve_list:
+            cve_list = '", "'.join(cve_list)
+        else:
+            cve_list = ''
+
+        if debug:
+            print "CVE List : ", cve_list
+
+        return cve_list
+
+
+    def getAdvID(self, debug=0):
+        """
+        Returns Gentoo Security Advisory ID
+        """
+
+        if debug:
+            print "\nGetting Advisory ID..."
+
+        adv_id_regex =  re.compile('Advisory Reference.*\n.*(GLSA.\d+-\d+) /')
+        adv_id = self._findAll(adv_id_regex)
+
+        if not adv_id:
+            return ''
+
+        if debug:
+            print "Advisory ID : ", adv_id
+
+        return adv_id[0].strip()
+
+
+    def getAffectedPackage(self, debug=0):
+        """
+        Returns Affected Packages/RPM's
+        """
+
+        if debug:
+            print "\nGetting Affected Packages/RPM List..."
+
+        pkg_regex=  re.compile("Advisory Reference.*\n.*GLSA.\d+-\d+ /.?(.*)<")
+        pkg = self._findAll(pkg_regex)
+
+        if pkg:
+            pkg = pkg[0].strip()
+        else:
+            pkg = ''
+
+        if debug:
+            print "Affected Packages/RPMS : ", pkg
+
+        return pkg
+
+
+    def getDescription(self, debug=0):
+        """
+        Returns Vulnerability Description
+        """
+        description = ''
+
+        if debug:
+            print "\nGetting Vulnerability Description..."
+
+        desc_regex =  re.compile("(?s)Description<(.*)Impact<", re.IGNORECASE)
+        desc = self._findAll(desc_regex)
+
+        if desc:
+            desc = desc[0].strip()
+
+            ## Formatting the description
+            for line in desc.split('\n'):
+                line = line.strip()
+                if "<p" in line or "p>" in line:
+                    continue
+                line = line.strip('<li>').strip('</li>').strip('<ul>')
+                description += '  ' + line
+
+            description = description.replace('"'," &qt ")
+
+        if description:
+            ## Format line which exceeds 79 character.
+            description = utils.formatMultiLines(description)
+            description = description.strip()     
+
+        return description
+
+
+    def getImapct(self, debug=0):
+        """
+        Returns Vulnerability Description
+        """
+        impact_desc = ''
+
+        if debug:
+            print "\nGetting Vulnerability Impact..."
+
+        impact_regex =  re.compile("(?s)Description<(.*)Resolution "+ \
+                                               "Information<", re.IGNORECASE)
+        impact = self._findAll(impact_regex)
+
+        if impact:
+            impact = impact[0].strip()
+            impact =  re.findall("(?s)Impact<.*",impact)
+
+            if impact:
+                impact = impact[0].strip()
+                ## Formatting the Impact
+                for line in impact.split('\n'):
+                    line = line.strip()
+                    if "<p" in line or "p>" in line or "span>" in line:
+                        continue
+                    line = line.strip('<li>').strip('</li>').strip('<ul>')
+                    impact_desc += '  ' + line
+
+                impact_desc = impact_desc.replace('"'," &qt ")
+
+
+        if impact_desc:
+            ## Format line which exceeds 79 character.
+            impact_desc = utils.formatMultiLines(impact_desc)
+            impact_desc = impact_desc.strip()
+        elif debug:
+            print "Warning: Impact Not found..."
+
+        return impact_desc
+
+
+    def getAffectedProduct(self, debug=0):
+        """
+        Returns Affected Product/Platform
+        """
+        products = ''
+
+        ## Different Architectures
+        architectures = 'All supported architecture.?|Intel compatible|'+ \
+                        'AMD64|x86 ppc hppa'
+
+        ## Get Affected Product/Platform
+        prod_regex =  re.compile(architectures, re.IGNORECASE)
+        products = self._findAll(prod_regex)
+
+        if products:
+            products = products[0].strip()
+
+        if debug:
+            print "\nAffected Product is/are : (%s)" %(products)
+
+        return products
+
+
+    def getRPM(self, prod,  debug=0):
+        """
+        Returns OS Package Dictionary
+        """
+
+        if debug:
+            print "\nGetting RPM List..."
+
+        os_pkg_dict = {}
+        all_pkgs = {}
+
+        pkg_sec = re.findall("(?s)>Architecture.*Related bugreport", \
+                                                            self.Html_content)
+        if not pkg_sec:
+            if debug:
+                print "ERROR: Didn't find Package Section"
+            return os_pkg_dict
+
+        ## Parse each line and construct dict having Package and 
+        ## their required elements.
+        ## Result at the end of the for loop : 
+        ## {'kde-base/kdelibs': ['lt', '4.0', 'rge', '3.5.8-r4', 'rge',
+        ## '3.5.9-r3', 'gt', '4.0', 'lt', '3.5.5', 'rge', '3.5.10-r2']}}"
+
+        pkg_sec = pkg_sec[0].strip()
+        pkg = ''
+        for line in pkg_sec.split('\n'):
+            line = line.strip()
+
+            tmp = re.findall('<td.*">(.*)<',line)
+            if tmp: 
+                pkg = tmp[0].strip()
+                if pkg:
+                    if debug:
+                        print "Package Name : ", pkg
+                    all_pkgs[pkg] = []
+                continue
+
+            if pkg and "&lt;=" in line:
+                if debug:
+                    print "Package less then (<) : ", line
+                if "revision" in line:
+                    all_pkgs[pkg].append("rle")
+                else:
+                    all_pkgs[pkg].append("le")
+                continue
+
+            if pkg and "&lt;" in line:
+                if debug:
+                    print "Package less then (<) : ", line
+                if "revision" in line:
+                    all_pkgs[pkg].append("rlt")
+                else:
+                    all_pkgs[pkg].append("lt")
+                continue
+
+            if pkg and "&gt;=" in line:
+                if debug:
+                    print "Package greater then equal (>=) : ", line
+                if "revision" in line:
+                    all_pkgs[pkg].append("rge")
+                else:
+                    all_pkgs[pkg].append("ge")
+                continue
+
+            if pkg and "&gt;" in line:
+                if debug:
+                    print "Package greater then equal (>) : ", line
+                if "revision" in line:
+                    all_pkgs[pkg].append("rgt")
+                else:
+                    all_pkgs[pkg].append("gt")
+                continue
+
+            if pkg and "=" in line:
+                if debug:
+                    print "Package equal (=) : ", line
+                line = line.strip().strip('</td>')
+                if line == '=':
+                    if "revision" in line:
+                        all_pkgs[pkg].append("req")
+                    else:
+                        all_pkgs[pkg].append("eq")
+                continue
+
+            if pkg:
+                ver = re.findall('([0-9.]+)', line)
+                if ver:
+                    ver = re.findall('([0-9.]+.*)<', line)
+                    if not ver:
+                        ver = re.findall('([0-9.]+.*),', line)
+                    if ver:
+                        if debug:
+                            print "Package Version : ", line
+                        all_pkgs[pkg].append(ver[0])
+                    elif debug and 'AMD' not in line:
+                        print "ERROR: Version not found : ", line
+                continue
+
+        if debug:
+            print "\nProduct : ", prod
+            print "ALL Packges and versions are : ", all_pkgs
+
+        ## Add the OS with packages.
+        if all_pkgs and prod:
+           os_pkg_dict[prod] = all_pkgs
+
+        return os_pkg_dict
+
+
+    def formatReference(self, main_url, file_name):
+       """
+       Constructs a reference for advisory
+       """
+       if not main_url.endswith('/'):
+           main_url = main_url + '/'
+
+       reference = main_url + file_name.replace('.html','.xml')
+
+       return reference
+
+
+    def parser(self, html_content, debug=0):
+        """
+        Main parser function, builds the parser object
+        by invoking parse functions
+        """
+
+        try:
+            if debug:
+                print "Gentoo Parser Initiated..."
+
+            self.Html_content = html_content.replace('\r\n', '\n')
+
+            self.CVEs = self.getCVE(debug)
+
+            self.Platforms = self.getAffectedProduct(debug)
+            if not self.Platforms or self.Platforms == []:
+                if debug:
+                    print "\nERROR: Required Products not found..."
+                return False
+
+            self.Packages = self.getRPM(self.Platforms, debug)
+            if not self.Packages or self.Packages == '':
+                if debug:
+                    print "\nERROR: Required Packages not found..."
+                return False
+
+            self.Description = self.getDescription(debug)
+            if not self.Description or self.Description == '':
+                if debug:
+                    print "\nERROR: Description not found..."
+                return False
+
+            self.AdvID = self.getAdvID(debug)
+            if not self.AdvID or self.AdvID == '':
+                if debug:
+                    print "\nERROR: Advisory ID not found..."
+                return False
+
+            self.Product = self.getAffectedPackage(debug)
+            if not self.Product or self.Product == '':
+                if debug:
+                    print "\nERROR: Required Products not found..."
+                return False
+
+            if len(self.Product) > 40:
+                if len(self.Product.split()[0]) < 40:
+                    product = self.Product.split()[0]
+                elif len(self.Product.split(',')[0]) < 40:
+                    product = self.Product.split(',')[0]
+                product = product.strip(',') + ' and other packages'
+            else:
+                product = self.Product
+
+            self.Summary = product
+
+            self.Name = product + " " + self.AdvID
+
+            self.Impact = self.getImapct(debug)
+
+            ## Construct File Name
+            self.FileName = "gentoo_" + self.AdvID.replace(' ', '_')\
+                                                             .replace('-','_')
+            ## Set XREF
+            (name, value) = self.AdvID.split()
+            self.XREF = [name, value]
+
+            if debug:
+                print "\nAll mandatory attributes are parsed: ", self.AdvID
+
+            return True
+
+        except Exception, msg:
+            print 'Exception in Parser gentoo -> Parser -> parser() Method ', msg
+            sys.exit(msg)


Property changes on: trunk/openvas-plugins/extra/lsc_generator/parser/gentoo.py
___________________________________________________________________
Name: svn:executable
   + *

Added: trunk/openvas-plugins/extra/lsc_generator/templates/Gentoo.template
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/templates/Gentoo.template	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/templates/Gentoo.template	2009-05-20 14:24:39 UTC (rev 3452)
@@ -0,0 +1,71 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Gentoo Update for __SCRIPT_NAME__
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2009 Intevation GmbH, http://www.intevation.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(__SCRIPT_ID__);
+  script_version("$Revision: 1.0 $");
+  script_xref(name: "__XREF_NAME__", value: "__XREF_VALUE__");
+  script_cve_id("__CVEIDS__");
+  script_name(english: "Gentoo Update for __SCRIPT_NAME__");
+  desc["english"] = "
+
+  Vulnerability Insight:
+  __SCRIPT_DESC__
+
+  Impact:
+  __SCRIPT_IMPACT__
+
+  Affected Software/OS:
+  __SCRIPT_PROD__ on __SCRIPT_PLAT__
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  __SCRIPT_REF__
+
+  Risk factor: High";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for the Version of __SCRIPT_PKG__");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Intevation GmbH");
+  script_family(english:"Gentoo Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-gentoo.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+___IS_GENTOO_PKG_VULN___


Property changes on: trunk/openvas-plugins/extra/lsc_generator/templates/Gentoo.template
___________________________________________________________________
Name: svn:executable
   + *

Modified: trunk/openvas-plugins/extra/lsc_generator/test/sanity_test.py
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/test/sanity_test.py	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/test/sanity_test.py	2009-05-20 14:24:39 UTC (rev 3452)
@@ -67,7 +67,8 @@
             req_files = [openvas_plugin_path + 'revisions-lib.inc',
                          openvas_plugin_path + 'pkg-lib-rpm.inc',
                          openvas_plugin_path + 'pkg-lib-deb.inc',
-                         openvas_plugin_path + 'pkg-lib-hpux.inc']
+                         openvas_plugin_path + 'pkg-lib-hpux.inc',
+                         openvas_plugin_path + 'pkg-lib-gentoo.inc']
 
             for i in self.os_list:
                 req_files.append(self.build_path + i.title() + '/*.nasl')

Modified: trunk/openvas-plugins/extra/lsc_generator/test/unit_test/__init__.py
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/test/unit_test/__init__.py	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/test/unit_test/__init__.py	2009-05-20 14:24:39 UTC (rev 3452)
@@ -1,3 +1,4 @@
+import test_gentoo
 import test_hpux
 import test_mandriva
 import test_ubuntu

Added: trunk/openvas-plugins/extra/lsc_generator/test/unit_test/test_gentoo.py
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/test/unit_test/test_gentoo.py	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/test/unit_test/test_gentoo.py	2009-05-20 14:24:39 UTC (rev 3452)
@@ -0,0 +1,196 @@
+##############################################################################
+# Local Security Check Automation Framework
+#
+# Authors:
+# Veerendra GG <veerendragg at secpod.com>
+#
+# Revision 1.0
+# Date: 2009/05/18
+#
+# Copyright:
+# Copyright (c) 2009 SecPod , http://www.secpod.org
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+import unittest
+from parser import gentoo
+
+
+class GentooParserTestCase(unittest.TestCase):
+
+    ## Initial Setup
+    gentoo_parser_obj = gentoo.Parser()
+
+    def setUp(self):
+        ptr = open('./test/unit_test/work/input/glsa-200804-30.html', 'r')
+        lines = ptr.readlines()
+        ptr.close
+
+        self.Html_content = "".join(lines)
+        setattr(self.gentoo_parser_obj, 'Html_content', self.Html_content)
+
+
+    def test_getCVE(self):
+        print "\nTesting Gentoo Parser Test Suite ..."
+        req_out_put = 'CVE-2008-1671'
+
+        out_put = self.gentoo_parser_obj.getCVE()
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getAdvID(self):
+        req_out_put = 'GLSA 200804-30'
+
+        out_put = self.gentoo_parser_obj.getAdvID()
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getAffectedPackage(self):
+        req_out_put = 'kdelibs'
+
+        out_put = self.gentoo_parser_obj.getAffectedPackage()
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getDescription(self):
+        req_out_put = "Vulnerabilities have been reported in the processing of user-controlled data \n  by start_kdeinit, which is setuid root by default." 
+
+        out_put = self.gentoo_parser_obj.getDescription()
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getAffectedProduct1(self):
+        req_out_put = 'All supported architectures'
+
+        out_put = self.gentoo_parser_obj.getAffectedProduct()
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getAffectedProduct2(self):
+        req_out_put = 'Intel compatible'
+        ptr = open('./test/unit_test/work/input/glsa-200704-13.html', 'r')
+        lines = ptr.readlines()
+        ptr.close
+
+        self.Html_content = "".join(lines)
+        setattr(self.gentoo_parser_obj, 'Html_content', self.Html_content)
+
+        out_put = self.gentoo_parser_obj.getAffectedProduct()
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getAffectedProduct3(self):
+        req_out_put = 'x86 ppc hppa'
+        ptr = open('./test/unit_test/work/input/glsa-200703-23.html', 'r')
+        lines = ptr.readlines()
+        ptr.close
+
+        self.Html_content = "".join(lines)
+        setattr(self.gentoo_parser_obj, 'Html_content', self.Html_content)
+
+        out_put = self.gentoo_parser_obj.getAffectedProduct()
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getRPM1(self):
+        req_out_put = {'All supported architectures': {'kde-base/kdelibs': ['lt', '4.0', 'rge', '3.5.8-r4', 'rge', '3.5.9-r3', 'gt', '4.0', 'lt', '3.5.5', 'rge', '3.5.10-r2']}}
+
+        prod = 'All supported architectures' 
+        out_put = self.gentoo_parser_obj.getRPM(prod)
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getRPM2(self):
+        req_out_put = {'x86 ppc hppa': {'www-apps/wordpress': ['le', '2.1.2']}}
+
+        ptr = open('./test/unit_test/work/input/glsa-200703-23.html', 'r')
+        lines = ptr.readlines()
+        ptr.close
+
+        self.Html_content = "".join(lines)
+        setattr(self.gentoo_parser_obj, 'Html_content', self.Html_content)
+
+        prod = 'x86 ppc hppa' 
+        out_put = self.gentoo_parser_obj.getRPM(prod)
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getRPM3(self):
+        req_out_put = {'Intel compatible': {'sys-apps/file': ['eq', '4.21', 'ge', '4.21-r1']}}
+
+        ptr = open('./test/unit_test/work/input/glsa-200704-13.html', 'r')
+        lines = ptr.readlines()
+        ptr.close
+
+        self.Html_content = "".join(lines)
+        setattr(self.gentoo_parser_obj, 'Html_content', self.Html_content)
+
+        prod = 'Intel compatible' 
+        out_put = self.gentoo_parser_obj.getRPM(prod)
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getRPM4(self):
+        req_out_put = {'All supported architectures': {'app-text/ghostscript-gnu': ['lt', '8.62.0', 'ge', '8.62.0'], 'app-text/ghostscript-gpl': ['lt', '8.64-r2', 'ge', '8.64-r2'], 'app-text/ghostscript-esp': ['le', '8.15.4-r1']}}
+
+        ptr = open('./test/unit_test/work/input/glsa-200903-37.html', 'r')
+        lines = ptr.readlines()
+        ptr.close
+
+        self.Html_content = "".join(lines)
+        setattr(self.gentoo_parser_obj, 'Html_content', self.Html_content)
+
+        prod = 'All supported architectures' 
+        out_put = self.gentoo_parser_obj.getRPM(prod)
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_formatReference1(self):
+        req_out_put = 'http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml'
+
+        main_url = 'http://www.gentoo.org/security/en/glsa/'
+        file_name = 'glsa-200903-37.html'
+        out_put = self.gentoo_parser_obj.formatReference(main_url, file_name)
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_formatReference2(self):
+        req_out_put = 'http://www.gentoo.org/security/en/glsa/glsa-200905-01.xml'
+
+        main_url = 'http://www.gentoo.org/security/en/glsa/'
+        file_name = 'glsa-200905-01.html'
+        out_put = self.gentoo_parser_obj.formatReference(main_url, file_name)
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_parser(self):
+        req_out_put = True
+
+        out_put = self.gentoo_parser_obj.parser(self.Html_content)
+        self.assertEquals(out_put, req_out_put)
+
+
+    def test_getYearLinks(self):
+        req_out_put = ['http://www.gentoo.org/security/en/glsa/glsa-200905-01.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-20.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-19.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-18.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-17.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-16.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-15.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-14.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-13.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-12.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-11.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-10.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-09.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-08.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-07.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-06.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-05.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-04.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-03.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-02.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200904-01.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-41.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-40.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-39.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-38.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-36.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-35.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-34.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-33.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-32.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-31.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-30.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-29.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-28.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-27.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-26.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-25.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-24.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-23.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-22.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-21.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-19.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-18.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-16.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-15.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-14.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-13.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-12.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-11.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-10.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-09.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-08.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-07.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-06.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-05.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-04.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-03.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-02.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200903-01.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200902-06.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200902-05.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200902-04.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200902-03.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200902-02.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200902-01.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-15.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-14.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-13.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-12.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-11.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-10.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-09.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-08.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-07.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-06.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-05.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-04.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-03.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-02.xml', 'http://www.gentoo.org/security/en/glsa/glsa-200901-01.xml']
+
+        link = './test/unit_test/work/input/gentoo-advisory-main.html'
+        year = '2009'
+        out_put = self.gentoo_parser_obj._getYearLinks(link, year)
+        self.assertEquals(out_put, req_out_put)
+
+
+if __name__ == '__main__':
+    unittest.main()
+


Property changes on: trunk/openvas-plugins/extra/lsc_generator/test/unit_test/test_gentoo.py
___________________________________________________________________
Name: svn:executable
   + *

Modified: trunk/openvas-plugins/extra/lsc_generator/test/unit_test/test_hpux.py
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/test/unit_test/test_hpux.py	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/test/unit_test/test_hpux.py	2009-05-20 14:24:39 UTC (rev 3452)
@@ -43,7 +43,7 @@
 
 
     def test_getCVE(self):
-        print "\nTesting Redhat Parser Test Suite ..."
+        print "\nTesting HP-UX Parser Test Suite ..."
         req_out_put = 'CVE-2007-6420", "CVE-2008-1232", "CVE-2008-1947", "CVE-2008-2364", "CVE-2008-2370", "CVE-2008-2938", "CVE-2008-2939", "CVE-2008-3658'
 
         out_put = self.hpux_parser_obj.getCVE()

Added: trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/gentoo-advisory-main.html
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/gentoo-advisory-main.html	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/gentoo-advisory-main.html	2009-05-20 14:24:39 UTC (rev 3452)
@@ -0,0 +1,19292 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
+<html lang="en">
+<head>
+<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+<link title="new" rel="stylesheet" href="../../../css/main.css" type="text/css">
+<link REL="shortcut icon" HREF="../../../favicon.ico" TYPE="image/x-icon">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/www-gentoo-org.xml" title="Gentoo Website">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/forums-gentoo-org.xml" title="Gentoo Forums">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/bugs-gentoo-org.xml" title="Gentoo Bugzilla">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/packages-gentoo-org.xml" title="Gentoo Packages">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/archives-gentoo-org.xml" title="Gentoo List Archives">
+<link rel="alternate" type="application/rss+xml" href="/rdf/en/glsa-index.rdf">
+<title>Gentoo Linux Documentation
+--
+  Gentoo Linux Security Advisories</title>
+</head>
+<body style="margin:0px;" bgcolor="#ffffff"><table width="100%" border="0" cellspacing="0" cellpadding="0">
+<tr><td valign="top" height="125" bgcolor="#45347b"><a href="/"><img border="0" src="../../../images/gtop-www.jpg" alt="Gentoo Logo"></a></td></tr>
+
+<tr><td valign="top" align="right" colspan="1" bgcolor="#ffffff"><table border="0" cellspacing="0" cellpadding="0" width="100%"><tr>
+<td width="99%" class="content" valign="top" align="left">
+<br><h1>Gentoo Linux Security Advisories</h1>
+<p class="chaphead"><a name="doc_chap1"></a><span class="chapnum">1. 
+            </span>GLSA Chronological Index</p>
+<table class="ntable">
+  <tr>
+    <td class="infohead"><b>GLSA</b></td>
+    <td class="infohead"><b>Severity</b></td>
+    <td class="infohead"><b>Package</b></td>
+
+    <td class="infohead"><b>Description</b></td>
+    <td class="infohead"><b>Bug</b></td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200905-01.xml">
+        200905-01
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/asterisk
+    </td>
+    <td class="tableinfo">
+      Asterisk: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=218966">
+        218966
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-20.xml">
+
+        200904-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-print/cups
+    </td>
+    <td class="tableinfo">
+
+      CUPS: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=263070">
+        263070
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-19.xml">
+        200904-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/lcms
+    </td>
+
+    <td class="tableinfo">
+      LittleCMS: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=260269">
+        260269
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-18.xml">
+        200904-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      sys-fs/udev
+    </td>
+    <td class="tableinfo">
+      udev: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=266290">
+        266290
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-17.xml">
+        200904-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/acroread
+    </td>
+    <td class="tableinfo">
+      Adobe Reader: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=259992">
+        259992
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-16.xml">
+        200904-16
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libsndfile
+    </td>
+    <td class="tableinfo">
+      libsndfile: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=261173">
+
+        261173
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-15.xml">
+        200904-15
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/mpg123
+    </td>
+    <td class="tableinfo">
+      mpg123: User-assisted execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=265342">
+        265342
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-14.xml">
+
+        200904-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-antivirus/f-prot
+    </td>
+    <td class="tableinfo">
+
+      F-PROT Antivirus: Multiple Denial of Service vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=232665">
+        232665
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-13.xml">
+        200904-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/ventrilo-server-bin
+    </td>
+
+    <td class="tableinfo">
+      Ventrilo: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=234819">
+        234819
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-12.xml">
+        200904-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-misc/wicd
+    </td>
+    <td class="tableinfo">
+      Wicd: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=258596">
+        258596
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-11.xml">
+        200904-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      net-misc/tor
+    </td>
+    <td class="tableinfo">
+      Tor: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=250018">
+        250018
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-10.xml">
+        200904-10
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/avahi
+    </td>
+    <td class="tableinfo">
+      Avahi: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=260971">
+
+        260971
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-09.xml">
+        200904-09
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-crypt/mit-krb5
+    </td>
+    <td class="tableinfo">
+      MIT Kerberos 5: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=262736">
+        262736
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-08.xml">
+
+        200904-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/openssl
+    </td>
+    <td class="tableinfo">
+
+      OpenSSL: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=263751">
+        263751
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-07.xml">
+        200904-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/xpdf
+    </td>
+
+    <td class="tableinfo">
+      Xpdf: Untrusted search path
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=242930">
+        242930
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-06.xml">
+        200904-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-gfx/eog
+    </td>
+    <td class="tableinfo">
+      Eye of GNOME: Untrusted search path
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=257002">
+        257002
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-05.xml">
+        200904-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-misc/ntp
+    </td>
+    <td class="tableinfo">
+      ntp: Certificate validation error
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=254098">
+        254098
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-04.xml">
+        200904-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-irc/weechat
+    </td>
+    <td class="tableinfo">
+      WeeChat: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=262997">
+
+        262997
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-03.xml">
+        200904-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/gnumeric
+    </td>
+    <td class="tableinfo">
+      Gnumeric: Untrusted search path
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=257012">
+        257012
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-02.xml">
+
+        200904-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/glib
+    </td>
+    <td class="tableinfo">
+
+      GLib: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=249214">
+        249214
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200904-01.xml">
+        200904-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-im/openfire
+    </td>
+
+    <td class="tableinfo">
+      Openfire: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=246008">
+        246008
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-41.xml">
+        200903-41
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-editors/gedit
+    </td>
+    <td class="tableinfo">
+      gedit: Untrusted search path
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=257004">
+        257004
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-40.xml">
+        200903-40
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-admin/analog
+    </td>
+    <td class="tableinfo">
+      Analog: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=249140">
+        249140
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-39.xml">
+        200903-39
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      sys-auth/pam_krb5
+    </td>
+    <td class="tableinfo">
+      pam_krb5: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=257075">
+
+        257075
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-38.xml">
+        200903-38
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-proxy/squid
+    </td>
+    <td class="tableinfo">
+      Squid: Multiple Denial of Service vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=216319">
+        216319
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-37.xml">
+
+        200903-37
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/ghostscript-gpl (and 2 <a href="http://security.gentoo.org/glsa/glsa-200903-37.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Ghostscript: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=261087">
+        261087
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-36.xml">
+        200903-36
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-p2p/mldonkey
+    </td>
+    <td class="tableinfo">
+      MLDonkey: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=260072">
+        260072
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-35.xml">
+        200903-35
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-misc/muttprint
+    </td>
+    <td class="tableinfo">
+      Muttprint: Insecure temporary file usage
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=250554">
+        250554
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-34.xml">
+        200903-34
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/amarok
+    </td>
+    <td class="tableinfo">
+      Amarok: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=254896">
+
+        254896
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-33.xml">
+        200903-33
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/ffmpeg (and 2 <a href="http://security.gentoo.org/glsa/glsa-200903-33.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      FFmpeg: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=231831">
+        231831
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-32.xml">
+
+        200903-32
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-db/phpmyadmin
+    </td>
+    <td class="tableinfo">
+
+      phpMyAdmin: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=237781">
+        237781
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-31.xml">
+        200903-31
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libcdaudio
+    </td>
+
+    <td class="tableinfo">
+      libcdaudio: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=245649">
+        245649
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-30.xml">
+        200903-30
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-client/opera
+    </td>
+    <td class="tableinfo">
+      Opera: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=247229">
+        247229
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-29.xml">
+        200903-29
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-wireless/bluez-utils (and 1 <a href="http://security.gentoo.org/glsa/glsa-200903-29.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      BlueZ: Arbitrary code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=230591">
+        230591
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-28.xml">
+        200903-28
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libpng
+    </td>
+    <td class="tableinfo">
+      libpng: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=244808">
+
+        244808
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-27.xml">
+        200903-27
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-ftp/proftpd
+    </td>
+    <td class="tableinfo">
+      ProFTPD: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=258450">
+        258450
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-26.xml">
+
+        200903-26
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-im/tmsnc
+    </td>
+    <td class="tableinfo">
+
+      TMSNC: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=229157">
+        229157
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-25.xml">
+        200903-25
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-libs/courier-authlib
+    </td>
+
+    <td class="tableinfo">
+      Courier Authentication Library: SQL Injection vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=252576">
+        252576
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-24.xml">
+        200903-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      sys-apps/shadow
+    </td>
+    <td class="tableinfo">
+      Shadow: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=251320">
+        251320
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-23.xml">
+        200903-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-www/netscape-flash
+    </td>
+    <td class="tableinfo">
+      Adobe Flash Player: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=239543">
+        239543
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-22.xml">
+        200903-22
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      sys-cluster/ganglia
+    </td>
+    <td class="tableinfo">
+      Ganglia: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=255366">
+
+        255366
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-21.xml">
+        200903-21
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/curl
+    </td>
+    <td class="tableinfo">
+      cURL: Arbitrary file access
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=260361">
+        260361
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-20.xml">
+
+        200903-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apps/websvn
+    </td>
+    <td class="tableinfo">
+
+      WebSVN: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=243852">
+        243852
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-19.xml">
+        200903-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/xerces-c
+    </td>
+
+    <td class="tableinfo">
+      Xerces-C++: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=240496">
+        240496
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-18.xml">
+        200903-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-misc/openswan
+    </td>
+    <td class="tableinfo">
+      Openswan: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=238574">
+        238574
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-17.xml">
+        200903-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-misc/vnc
+    </td>
+    <td class="tableinfo">
+      Real VNC: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=255225">
+        255225
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-16.xml">
+        200903-16
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/epiphany
+    </td>
+    <td class="tableinfo">
+      Epiphany: Untrusted search path
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=257000">
+
+        257000
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-15.xml">
+        200903-15
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-util/git
+    </td>
+    <td class="tableinfo">
+      git: Multiple vulnerabilties
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=251343">
+        251343
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-14.xml">
+
+        200903-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/bind
+    </td>
+    <td class="tableinfo">
+
+      BIND: Incorrect signature verification
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=254134">
+        254134
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-13.xml">
+        200903-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/mpfr
+    </td>
+
+    <td class="tableinfo">
+      MPFR: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=260968">
+        260968
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-12.xml">
+        200903-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-gfx/optipng
+    </td>
+    <td class="tableinfo">
+      OptiPNG: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=260265">
+        260265
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-11.xml">
+        200903-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-python/pycrypto
+    </td>
+    <td class="tableinfo">
+      PyCrypto: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=258049">
+        258049
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-10.xml">
+        200903-10
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-games/irrlicht
+    </td>
+    <td class="tableinfo">
+      Irrlicht: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=252203">
+
+        252203
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-09.xml">
+        200903-09
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      games-simulation/openttd
+    </td>
+    <td class="tableinfo">
+      OpenTTD: Execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=233929">
+        233929
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-08.xml">
+
+        200903-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sci-electronics/geda
+    </td>
+    <td class="tableinfo">
+
+      gEDA: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=247538">
+        247538
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-07.xml">
+        200903-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-fs/samba
+    </td>
+
+    <td class="tableinfo">
+      Samba: Data disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=247620">
+        247620
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-06.xml">
+        200903-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-fs/nfs-utils
+    </td>
+    <td class="tableinfo">
+      nfs-utils: Access restriction bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=242696">
+        242696
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-05.xml">
+        200903-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/pdfjam
+    </td>
+    <td class="tableinfo">
+      PDFjam: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=252734">
+        252734
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-04.xml">
+        200903-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/devil
+    </td>
+    <td class="tableinfo">
+      DevIL: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=255217">
+
+        255217
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-03.xml">
+        200903-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/audacity
+    </td>
+    <td class="tableinfo">
+      Audacity: User-assisted execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=253493">
+        253493
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-02.xml">
+
+        200903-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-irc/znc
+    </td>
+    <td class="tableinfo">
+
+      ZNC: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=260148">
+        260148
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200903-01.xml">
+        200903-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/vinagre
+    </td>
+
+    <td class="tableinfo">
+      Vinagre: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=250314">
+        250314
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200902-06.xml">
+        200902-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-editors/emacs (and 1 <a href="http://security.gentoo.org/glsa/glsa-200902-06.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      GNU Emacs, XEmacs: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=221197">
+        221197
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200902-05.xml">
+        200902-05
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-p2p/ktorrent
+    </td>
+    <td class="tableinfo">
+      KTorrent: Multiple vulnerabilitites
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=244741">
+
+        244741
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200902-04.xml">
+        200902-04
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      x11-terms/xterm
+    </td>
+    <td class="tableinfo">
+      xterm: User-assisted arbitrary commands execution
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=253155">
+        253155
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200902-03.xml">
+
+        200902-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-util/valgrind
+    </td>
+    <td class="tableinfo">
+
+      Valgrind: Untrusted search path
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=245317">
+        245317
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200902-02.xml">
+        200902-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/openssl
+    </td>
+
+    <td class="tableinfo">
+      OpenSSL: Certificate validation error
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=251346">
+        251346
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200902-01.xml">
+        200902-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      app-admin/sudo
+    </td>
+    <td class="tableinfo">
+      sudo: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=256633">
+        256633
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-15.xml">
+        200901-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-analyzer/net-snmp
+    </td>
+    <td class="tableinfo">
+      Net-SNMP: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=245306">
+        245306
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-14.xml">
+        200901-14
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      sci-mathematics/scilab
+    </td>
+    <td class="tableinfo">
+      Scilab: Insecure temporary file usage
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=245922">
+
+        245922
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-13.xml">
+        200901-13
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-im/pidgin
+    </td>
+    <td class="tableinfo">
+      Pidgin: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=230045">
+        230045
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-12.xml">
+
+        200901-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-dns/noip-updater
+    </td>
+    <td class="tableinfo">
+
+      noip-updater: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=248709">
+        248709
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-11.xml">
+        200901-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/avahi
+    </td>
+
+    <td class="tableinfo">
+      Avahi: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=250913">
+        250913
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-10.xml">
+        200901-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-libs/gnutls
+    </td>
+    <td class="tableinfo">
+      GnuTLS: Certificate validation error
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=245850">
+        245850
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-09.xml">
+        200901-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/acroread
+    </td>
+    <td class="tableinfo">
+      Adobe Reader: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=225483">
+        225483
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-08.xml">
+        200901-08
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apps/online-bookmarks
+    </td>
+    <td class="tableinfo">
+      Online-Bookmarks: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=235053">
+
+        235053
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-07.xml">
+        200901-07
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/mplayer
+    </td>
+    <td class="tableinfo">
+      MPlayer: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=231836">
+        231836
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-06.xml">
+
+        200901-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      games-fps/tremulous (and 1 <a href="http://security.gentoo.org/glsa/glsa-200901-06.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Tremulous: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222119">
+        222119
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-05.xml">
+        200901-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-sound/streamripper
+    </td>
+    <td class="tableinfo">
+      Streamripper: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=249039">
+        249039
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-04.xml">
+        200901-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      sys-apps/dbus
+    </td>
+    <td class="tableinfo">
+      D-Bus: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=240308">
+        240308
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-03.xml">
+        200901-03
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/pdnsd
+    </td>
+    <td class="tableinfo">
+      pdnsd: Denial of Service and cache poisoning
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=231285">
+
+        231285
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-02.xml">
+        200901-02
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/jhead
+    </td>
+    <td class="tableinfo">
+      JHead: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=242702">
+        242702
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200901-01.xml">
+
+        200901-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-wireless/ndiswrapper
+    </td>
+    <td class="tableinfo">
+
+      NDISwrapper: Arbitrary remote code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=239371">
+        239371
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-24.xml">
+        200812-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/vlc
+    </td>
+
+    <td class="tableinfo">
+      VLC: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=245774">
+        245774
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-23.xml">
+        200812-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-libs/imlib2
+    </td>
+    <td class="tableinfo">
+      Imlib2: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=248057">
+        248057
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-22.xml">
+        200812-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      www-apps/ampache
+    </td>
+    <td class="tableinfo">
+      Ampache: Insecure temporary file usage
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=237483">
+        237483
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-21.xml">
+        200812-21
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=245450">
+
+        245450
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-20.xml">
+        200812-20
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/phpcollab
+    </td>
+    <td class="tableinfo">
+      phpCollab: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=235052">
+        235052
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-19.xml">
+
+        200812-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/pdns
+    </td>
+    <td class="tableinfo">
+
+      PowerDNS: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=234032">
+        234032
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-18.xml">
+        200812-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/jasper
+    </td>
+
+    <td class="tableinfo">
+      JasPer: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222819">
+        222819
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-17.xml">
+        200812-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-lang/ruby
+    </td>
+    <td class="tableinfo">
+      Ruby: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=225465">
+        225465
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-16.xml">
+        200812-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-mail/dovecot
+    </td>
+    <td class="tableinfo">
+      Dovecot: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=240409">
+        240409
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-15.xml">
+        200812-15
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/povray
+    </td>
+    <td class="tableinfo">
+      POV-Ray: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153538">
+
+        153538
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-14.xml">
+        200812-14
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/aview
+    </td>
+    <td class="tableinfo">
+      aview: Insecure temporary file usage
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=235808">
+        235808
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-13.xml">
+
+        200812-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/openoffice (and 1 <a href="http://security.gentoo.org/glsa/glsa-200812-13.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      OpenOffice.org: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=235824">
+        235824
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-12.xml">
+        200812-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-analyzer/honeyd
+    </td>
+    <td class="tableinfo">
+      Honeyd: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=237481">
+        237481
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-11.xml">
+        200812-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      net-print/cups
+    </td>
+    <td class="tableinfo">
+      CUPS: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=238976">
+        238976
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-10.xml">
+        200812-10
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      perl-core/Archive-Tar
+    </td>
+    <td class="tableinfo">
+      Archive::Tar: Directory traversal vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=192989">
+
+        192989
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-09.xml">
+        200812-09
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/opensc
+    </td>
+    <td class="tableinfo">
+      OpenSC: Insufficient protection of smart card PIN
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=233543">
+        233543
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-08.xml">
+
+        200812-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dialup/mgetty
+    </td>
+    <td class="tableinfo">
+
+      Mgetty: Insecure temporary file usage
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=235806">
+        235806
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-07.xml">
+        200812-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/mantisbt
+    </td>
+
+    <td class="tableinfo">
+      Mantis: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=238570">
+        238570
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-06.xml">
+        200812-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-libs/libxml2
+    </td>
+    <td class="tableinfo">
+      libxml2: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=234099">
+        234099
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-05.xml">
+        200812-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/libsamplerate
+    </td>
+    <td class="tableinfo">
+      libsamplerate: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=237037">
+        237037
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-04.xml">
+        200812-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-servers/lighttpd
+    </td>
+    <td class="tableinfo">
+      lighttpd: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=238180">
+
+        238180
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-03.xml">
+        200812-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-firewall/ipsec-tools
+    </td>
+    <td class="tableinfo">
+      IPsec-Tools: racoon Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=232831">
+        232831
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-02.xml">
+
+        200812-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/enscript
+    </td>
+    <td class="tableinfo">
+
+      enscript: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=243228">
+        243228
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200812-01.xml">
+        200812-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/optipng
+    </td>
+
+    <td class="tableinfo">
+      OptiPNG: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=246522">
+        246522
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200811-05.xml">
+        200811-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-lang/php
+    </td>
+    <td class="tableinfo">
+      PHP: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=209148">
+        209148
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200811-04.xml">
+        200811-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-gfx/graphviz
+    </td>
+    <td class="tableinfo">
+      Graphviz: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=240636">
+        240636
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200811-03.xml">
+        200811-03
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/faad2
+    </td>
+    <td class="tableinfo">
+      FAAD2: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=238445">
+
+        238445
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200811-02.xml">
+        200811-02
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apps/gallery
+    </td>
+    <td class="tableinfo">
+      Gallery: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=234137">
+        234137
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200811-01.xml">
+
+        200811-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/opera
+    </td>
+    <td class="tableinfo">
+
+      Opera: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=235298">
+        235298
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200810-03.xml">
+        200810-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      mail-filter/libspf2
+    </td>
+
+    <td class="tableinfo">
+      libspf2: DNS response buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=242254">
+        242254
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200810-02.xml">
+        200810-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      sys-apps/portage
+    </td>
+    <td class="tableinfo">
+      Portage: Untrusted search path local root vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=239560">
+        239560
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200810-01.xml">
+        200810-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-dicts/wordnet
+    </td>
+    <td class="tableinfo">
+      WordNet: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=211491">
+        211491
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-18.xml">
+        200809-18
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple Denials of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=236665">
+
+        236665
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-17.xml">
+        200809-17
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-analyzer/wireshark
+    </td>
+    <td class="tableinfo">
+      Wireshark: Multiple Denials of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=236515">
+        236515
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-16.xml">
+
+        200809-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-util/git
+    </td>
+    <td class="tableinfo">
+
+      Git: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=234075">
+        234075
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-15.xml">
+        200809-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sys-apps/ed
+    </td>
+
+    <td class="tableinfo">
+      GNU ed: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=236521">
+        236521
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-14.xml">
+        200809-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-im/bitlbee
+    </td>
+    <td class="tableinfo">
+      BitlBee: Security bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=236160">
+        236160
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-13.xml">
+        200809-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-lang/R
+    </td>
+    <td class="tableinfo">
+      R: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=235822">
+        235822
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-12.xml">
+        200809-12
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-news/newsbeuter
+    </td>
+    <td class="tableinfo">
+      Newsbeuter: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=236506">
+
+        236506
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-11.xml">
+        200809-11
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-proxy/havp
+    </td>
+    <td class="tableinfo">
+      HAVP: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=234715">
+        234715
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-10.xml">
+
+        200809-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/mantisbt
+    </td>
+    <td class="tableinfo">
+
+      Mantis: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222649">
+        222649
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-09.xml">
+        200809-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-mta/postfix
+    </td>
+
+    <td class="tableinfo">
+      Postfix: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=236453">
+        236453
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-08.xml">
+        200809-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-sound/amarok
+    </td>
+    <td class="tableinfo">
+      Amarok: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=234689">
+        234689
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-07.xml">
+        200809-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/tiff
+    </td>
+    <td class="tableinfo">
+      libTIFF: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=234080">
+        234080
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-06.xml">
+        200809-06
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/vlc
+    </td>
+    <td class="tableinfo">
+      VLC: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=235238">
+
+        235238
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-05.xml">
+        200809-05
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-libs/courier-authlib
+    </td>
+    <td class="tableinfo">
+      Courier Authentication Library: SQL injection vulnerability
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=225407">
+        225407
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-04.xml">
+
+        200809-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-db/mysql
+    </td>
+    <td class="tableinfo">
+
+      MySQL: Privilege bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=220399">
+        220399
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-03.xml">
+        200809-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/realplayer
+    </td>
+
+    <td class="tableinfo">
+      RealPlayer: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=232997">
+        232997
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-02.xml">
+        200809-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-dns/dnsmasq
+    </td>
+    <td class="tableinfo">
+      dnsmasq: Denial of Service and DNS spoofing
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=231282">
+        231282
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200809-01.xml">
+        200809-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      gnome-extra/yelp
+    </td>
+    <td class="tableinfo">
+      yelp: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=234079">
+        234079
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-12.xml">
+        200808-12
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      mail-mta/postfix
+    </td>
+    <td class="tableinfo">
+      Postfix: Local privilege escalation vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=232642">
+
+        232642
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-11.xml">
+        200808-11
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/uudeview (and 1 <a href="http://security.gentoo.org/glsa/glsa-200808-11.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      UUDeview: Insecure temporary file creation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222275">
+        222275
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-10.xml">
+
+        200808-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/acroread
+    </td>
+    <td class="tableinfo">
+
+      Adobe Reader: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=233383">
+        233383
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-09.xml">
+        200808-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      net-nds/openldap
+    </td>
+
+    <td class="tableinfo">
+      OpenLDAP: Denial of Service vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=230269">
+        230269
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-08.xml">
+        200808-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+
+      net-misc/stunnel
+    </td>
+    <td class="tableinfo">
+      stunnel: Security bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222805">
+        222805
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-07.xml">
+        200808-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple Denials of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=204340">
+        204340
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-06.xml">
+        200808-06
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/libxslt
+    </td>
+    <td class="tableinfo">
+      libxslt: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=232172">
+
+        232172
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-05.xml">
+        200808-05
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/dhcp
+    </td>
+    <td class="tableinfo">
+      ISC DHCP: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=227135">
+        227135
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-04.xml">
+
+        200808-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-analyzer/wireshark
+    </td>
+    <td class="tableinfo">
+
+      Wireshark: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=230411">
+        230411
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-03.xml">
+        200808-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 7 <a href="http://security.gentoo.org/glsa/glsa-200808-03.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Mozilla products: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=204337">
+        204337
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-02.xml">
+        200808-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-analyzer/net-snmp
+    </td>
+    <td class="tableinfo">
+      Net-SNMP: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222265">
+        222265
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200808-01.xml">
+        200808-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/xine-lib
+    </td>
+    <td class="tableinfo">
+      xine-lib: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=213039">
+        213039
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-16.xml">
+        200807-16
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/python
+    </td>
+    <td class="tableinfo">
+      Python: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=230640">
+
+        230640
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-15.xml">
+        200807-15
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-nntp/pan
+    </td>
+    <td class="tableinfo">
+      Pan: User-assisted execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=224051">
+        224051
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-14.xml">
+
+        200807-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sys-process/audit
+    </td>
+    <td class="tableinfo">
+
+      Linux Audit: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=215705">
+        215705
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-13.xml">
+        200807-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/vlc
+    </td>
+
+    <td class="tableinfo">
+      VLC: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=221959">
+        221959
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-12.xml">
+        200807-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-irc/bitchx
+    </td>
+    <td class="tableinfo">
+      BitchX: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=190667">
+        190667
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-11.xml">
+        200807-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      media-sound/peercast
+    </td>
+    <td class="tableinfo">
+      PeerCast: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=220281">
+        220281
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-10.xml">
+        200807-10
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-backup/bacula
+    </td>
+    <td class="tableinfo">
+      Bacula: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196834">
+
+        196834
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-09.xml">
+        200807-09
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-util/mercurial
+    </td>
+    <td class="tableinfo">
+      Mercurial: Directory traversal
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=230193">
+        230193
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-08.xml">
+
+        200807-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-dns/bind
+    </td>
+    <td class="tableinfo">
+
+      BIND: Cache poisoning
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=231201">
+        231201
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-07.xml">
+        200807-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/nxnode (and 1 <a href="http://security.gentoo.org/glsa/glsa-200807-07.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      NX: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=230147">
+        230147
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-06.xml">
+        200807-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-servers/apache
+    </td>
+    <td class="tableinfo">
+      Apache: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222643">
+        222643
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-05.xml">
+        200807-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-office/openoffice (and 1 <a href="http://security.gentoo.org/glsa/glsa-200807-05.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      OpenOffice.org: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=225723">
+        225723
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-04.xml">
+        200807-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/poppler
+    </td>
+    <td class="tableinfo">
+      Poppler: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=229931">
+
+        229931
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-03.xml">
+        200807-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-libs/libpcre (and 1 <a href="http://security.gentoo.org/glsa/glsa-200807-03.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      PCRE: Buffer overflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=228091">
+        228091
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-02.xml">
+
+        200807-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/motion
+    </td>
+    <td class="tableinfo">
+
+      Motion: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=227053">
+        227053
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200807-01.xml">
+        200807-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/python
+    </td>
+
+    <td class="tableinfo">
+      Python: Multiple integer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=216673">
+        216673
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-11.xml">
+        200806-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-java/ibm-jdk-bin (and 1 <a href="http://security.gentoo.org/glsa/glsa-200806-11.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      IBM JDK/JRE: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=186277">
+        186277
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-10.xml">
+        200806-10
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/freetype
+    </td>
+    <td class="tableinfo">
+      FreeType: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=225851">
+
+        225851
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-09.xml">
+        200806-09
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libvorbis
+    </td>
+    <td class="tableinfo">
+      libvorbis: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222085">
+        222085
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-08.xml">
+
+        200806-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/openssl
+    </td>
+    <td class="tableinfo">
+
+      OpenSSL: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=223429">
+        223429
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-07.xml">
+        200806-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      x11-base/xorg-server
+    </td>
+
+    <td class="tableinfo">
+      X.Org X server: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=225419">
+        225419
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-06.xml">
+        200806-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      mail-client/evolution
+    </td>
+    <td class="tableinfo">
+      Evolution: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=223963">
+        223963
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-05.xml">
+        200806-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-misc/cbrpager
+    </td>
+    <td class="tableinfo">
+      cbrPager: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=223657">
+        223657
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-04.xml">
+        200806-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/rdesktop
+    </td>
+    <td class="tableinfo">
+      rdesktop: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=220911">
+
+        220911
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-03.xml">
+        200806-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/imlib2
+    </td>
+    <td class="tableinfo">
+      Imlib 2: User-assisted execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=223965">
+        223965
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-02.xml">
+
+        200806-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/libxslt
+    </td>
+    <td class="tableinfo">
+
+      libxslt: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222499">
+        222499
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200806-01.xml">
+        200806-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/mtr
+    </td>
+
+    <td class="tableinfo">
+      mtr: Stack-based buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=223017">
+        223017
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-23.xml">
+        200805-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-fs/samba
+    </td>
+    <td class="tableinfo">
+      Samba: Heap-based buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222299">
+        222299
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-22.xml">
+        200805-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-video/mplayer
+    </td>
+    <td class="tableinfo">
+      MPlayer: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=215006">
+        215006
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-21.xml">
+        200805-21
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apps/roundup
+    </td>
+    <td class="tableinfo">
+      Roundup: Permission bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212488">
+
+        212488
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-20.xml">
+        200805-20
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-libs/gnutls
+    </td>
+    <td class="tableinfo">
+      GnuTLS: Execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=222823">
+        222823
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-19.xml">
+
+        200805-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+
+      ClamAV: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=213762">
+        213762
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-18.xml">
+        200805-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 6 <a href="http://security.gentoo.org/glsa/glsa-200805-18.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Mozilla products: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=208128">
+        208128
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-17.xml">
+        200805-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-lang/perl (and 1 <a href="http://security.gentoo.org/glsa/glsa-200805-17.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Perl: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=219203">
+        219203
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-16.xml">
+        200805-16
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/openoffice (and 1 <a href="http://security.gentoo.org/glsa/glsa-200805-16.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      OpenOffice.org: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=218080">
+        218080
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-15.xml">
+        200805-15
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libid3tag
+    </td>
+    <td class="tableinfo">
+      libid3tag: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=210564">
+        210564
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-14.xml">
+
+        200805-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sci-libs/cdf
+    </td>
+    <td class="tableinfo">
+
+      Common Data Format library: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=220391">
+        220391
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-13.xml">
+        200805-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/ptex
+    </td>
+
+    <td class="tableinfo">
+      PTeX: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196673">
+        196673
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-12.xml">
+        200805-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-gfx/blender
+    </td>
+    <td class="tableinfo">
+      Blender: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=219008">
+        219008
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-11.xml">
+        200805-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-scheme/chicken
+    </td>
+    <td class="tableinfo">
+      Chicken: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198979">
+        198979
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-10.xml">
+        200805-10
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/pngcrush
+    </td>
+    <td class="tableinfo">
+      Pngcrush: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=219033">
+
+        219033
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-09.xml">
+        200805-09
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apps/moinmoin
+    </td>
+    <td class="tableinfo">
+      MoinMoin: Privilege escalation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=218752">
+        218752
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-08.xml">
+
+        200805-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-irc/inspircd
+    </td>
+    <td class="tableinfo">
+
+      InspIRCd: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=215704">
+        215704
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-07.xml">
+        200805-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/ltsp
+    </td>
+
+    <td class="tableinfo">
+      Linux Terminal Server Project: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=215699">
+        215699
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-06.xml">
+        200805-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-db/firebird
+    </td>
+    <td class="tableinfo">
+      Firebird: Data disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=216158">
+        216158
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-05.xml">
+        200805-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-analyzer/wireshark
+    </td>
+    <td class="tableinfo">
+      Wireshark: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=215276">
+        215276
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-04.xml">
+        200805-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/egroupware
+    </td>
+    <td class="tableinfo">
+      eGroupWare: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=214212">
+
+        214212
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-03.xml">
+        200805-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      x11-terms/aterm (and 6 <a href="http://security.gentoo.org/glsa/glsa-200805-03.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Multiple X11 terminals: Local privilege escalation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=216833">
+        216833
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-02.xml">
+
+        200805-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      dev-db/phpmyadmin
+    </td>
+    <td class="tableinfo">
+
+      phpMyAdmin: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=219005">
+        219005
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200805-01.xml">
+        200805-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apps/horde (and 5 <a href="http://security.gentoo.org/glsa/glsa-200805-01.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Horde Application Framework: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212635">
+        212635
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-30.xml">
+        200804-30
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      kde-base/kdelibs
+    </td>
+    <td class="tableinfo">
+      KDE start_kdeinit: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=218933">
+        218933
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-29.xml">
+        200804-29
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-gfx/comix
+    </td>
+    <td class="tableinfo">
+      Comix: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=215694">
+        215694
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-28.xml">
+        200804-28
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-java/jrockit-jdk-bin
+    </td>
+    <td class="tableinfo">
+      JRockit: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=218226">
+
+        218226
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-27.xml">
+        200804-27
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-im/silc-toolkit (and 2 <a href="http://security.gentoo.org/glsa/glsa-200804-27.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      SILC: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212362">
+        212362
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-26.xml">
+
+        200804-26
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-im/openfire
+    </td>
+    <td class="tableinfo">
+
+      Openfire: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=217234">
+        217234
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-25.xml">
+        200804-25
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/vlc
+    </td>
+
+    <td class="tableinfo">
+      VLC: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=214277">
+        214277
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-24.xml">
+        200804-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+
+      net-mail/dbmail
+    </td>
+    <td class="tableinfo">
+      DBmail: Data disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=218154">
+        218154
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-23.xml">
+        200804-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      net-print/cups
+    </td>
+    <td class="tableinfo">
+      CUPS: Integer overflow vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=217232">
+        217232
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-22.xml">
+        200804-22
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/pdns-recursor
+    </td>
+    <td class="tableinfo">
+      PowerDNS Recursor: DNS Cache Poisoning
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=215567">
+
+        215567
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-21.xml">
+        200804-21
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-www/netscape-flash
+    </td>
+    <td class="tableinfo">
+      Adobe Flash Player: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=204344">
+        204344
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-20.xml">
+
+        200804-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-java/sun-jre-bin (and 2 <a href="http://security.gentoo.org/glsa/glsa-200804-20.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Sun JDK/JRE: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=178851">
+        178851
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-19.xml">
+        200804-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-admin/php-toolkit
+    </td>
+    <td class="tableinfo">
+      PHP Toolkit: Data disclosure and Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=209535">
+        209535
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-18.xml">
+        200804-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/poppler
+    </td>
+    <td class="tableinfo">
+      Poppler: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=216850">
+        216850
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-17.xml">
+        200804-17
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/speex
+    </td>
+    <td class="tableinfo">
+      Speex: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=217715">
+
+        217715
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-16.xml">
+        200804-16
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/rsync
+    </td>
+    <td class="tableinfo">
+      rsync: Execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=216887">
+        216887
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-15.xml">
+
+        200804-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      media-libs/libpng
+    </td>
+    <td class="tableinfo">
+
+      libpng: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=217047">
+        217047
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-14.xml">
+        200804-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/opera
+    </td>
+
+    <td class="tableinfo">
+      Opera: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=216022">
+        216022
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-13.xml">
+        200804-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-misc/asterisk
+    </td>
+    <td class="tableinfo">
+      Asterisk: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=200792">
+        200792
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-12.xml">
+        200804-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      gnome-extra/gnome-screensaver
+    </td>
+    <td class="tableinfo">
+      gnome-screensaver: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=213940">
+        213940
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-11.xml">
+        200804-11
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-filter/policyd-weight
+    </td>
+    <td class="tableinfo">
+      policyd-weight: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=214403">
+
+        214403
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-10.xml">
+        200804-10
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-servers/tomcat
+    </td>
+    <td class="tableinfo">
+      Tomcat: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196066">
+        196066
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-09.xml">
+
+        200804-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-fs/am-utils
+    </td>
+    <td class="tableinfo">
+
+      am-utils: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=210158">
+        210158
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-08.xml">
+        200804-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-servers/lighttpd
+    </td>
+
+    <td class="tableinfo">
+      lighttpd: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212930">
+        212930
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-07.xml">
+        200804-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      dev-php5/pecl-apc
+    </td>
+    <td class="tableinfo">
+      PECL APC: Buffer Overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=214576">
+        214576
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-06.xml">
+        200804-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-arch/unzip
+    </td>
+    <td class="tableinfo">
+      UnZip: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=213761">
+        213761
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-05.xml">
+        200804-05
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/nxnode (and 1 <a href="http://security.gentoo.org/glsa/glsa-200804-05.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      NX: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=210317">
+        210317
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-04.xml">
+        200804-04
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-db/mysql
+    </td>
+    <td class="tableinfo">
+      MySQL: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=201669">
+        201669
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-03.xml">
+
+        200804-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/openssh
+    </td>
+    <td class="tableinfo">
+
+      OpenSSH: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=214985">
+        214985
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-02.xml">
+        200804-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-arch/bzip2
+    </td>
+
+    <td class="tableinfo">
+      bzip2: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=213820">
+        213820
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200804-01.xml">
+        200804-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      net-print/cups
+    </td>
+    <td class="tableinfo">
+      CUPS: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=211449">
+        211449
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-32.xml">
+        200803-32
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-analyzer/wireshark
+    </td>
+    <td class="tableinfo">
+      Wireshark: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212149">
+        212149
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-31.xml">
+        200803-31
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      app-crypt/mit-krb5
+    </td>
+    <td class="tableinfo">
+      MIT Kerberos 5: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=199205">
+
+        199205
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-30.xml">
+        200803-30
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-admin/conserver (and 8 <a href="http://security.gentoo.org/glsa/glsa-200803-30.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      ssl-cert eclass: Certificate disclosure
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=174759">
+        174759
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-29.xml">
+
+        200803-29
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apps/viewvc
+    </td>
+    <td class="tableinfo">
+
+      ViewVC: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212288">
+        212288
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-28.xml">
+        200803-28
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-nds/openldap
+    </td>
+
+    <td class="tableinfo">
+      OpenLDAP: Denial of Service vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=197446">
+        197446
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-27.xml">
+        200803-27
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-apps/moinmoin
+    </td>
+    <td class="tableinfo">
+      MoinMoin: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=209133">
+        209133
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-26.xml">
+        200803-26
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/acroread
+    </td>
+    <td class="tableinfo">
+      Adobe Acrobat Reader: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212367">
+        212367
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-25.xml">
+        200803-25
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-mail/dovecot
+    </td>
+    <td class="tableinfo">
+      Dovecot: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212336">
+
+        212336
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-24.xml">
+        200803-24
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-libs/libpcre (and 1 <a href="http://security.gentoo.org/glsa/glsa-200803-24.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      PCRE: Buffer overflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=209067">
+        209067
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-23.xml">
+
+        200803-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/wml
+    </td>
+    <td class="tableinfo">
+
+      Website META Language: Insecure temporary file usage
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=209927">
+        209927
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-22.xml">
+        200803-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-plugins/live
+    </td>
+
+    <td class="tableinfo">
+      LIVE555 Media Server: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=204065">
+        204065
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-21.xml">
+        200803-21
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-analyzer/sarg
+    </td>
+    <td class="tableinfo">
+      Sarg: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212208">
+        212208
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-20.xml">
+        200803-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      dev-libs/icu
+    </td>
+    <td class="tableinfo">
+      International Components for Unicode: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=208001">
+        208001
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-19.xml">
+        200803-19
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-servers/apache
+    </td>
+    <td class="tableinfo">
+      Apache: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=201163">
+
+        201163
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-18.xml">
+        200803-18
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-analyzer/cacti
+    </td>
+    <td class="tableinfo">
+      Cacti: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=209918">
+        209918
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-17.xml">
+
+        200803-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/pdflib
+    </td>
+    <td class="tableinfo">
+
+      PDFlib: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=203287">
+        203287
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-16.xml">
+        200803-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/mplayer
+    </td>
+
+    <td class="tableinfo">
+      MPlayer: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=208566">
+        208566
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-15.xml">
+        200803-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+
+      dev-db/phpmyadmin
+    </td>
+    <td class="tableinfo">
+      phpMyAdmin: SQL injection vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212000">
+        212000
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-14.xml">
+        200803-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/ghostscript-esp (and 2 <a href="http://security.gentoo.org/glsa/glsa-200803-14.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Ghostscript: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=208999">
+        208999
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-13.xml">
+        200803-13
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      media-video/vlc
+    </td>
+    <td class="tableinfo">
+      VLC: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=203345">
+
+        203345
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-12.xml">
+        200803-12
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/evolution
+    </td>
+    <td class="tableinfo">
+      Evolution: Format string vulnerability
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=212272">
+        212272
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-11.xml">
+
+        200803-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/vobcopy
+    </td>
+    <td class="tableinfo">
+
+      Vobcopy: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=197578">
+        197578
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-10.xml">
+        200803-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-servers/lighttpd
+    </td>
+
+    <td class="tableinfo">
+      lighttpd: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=211230">
+        211230
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-09.xml">
+        200803-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-client/opera
+    </td>
+    <td class="tableinfo">
+      Opera: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=210260">
+        210260
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-08.xml">
+        200803-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/win32codecs
+    </td>
+    <td class="tableinfo">
+      Win32 binary codecs: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=150288">
+        150288
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-07.xml">
+        200803-07
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Low
+    </td>
+    <td class="tableinfo">
+      dev-python/paramiko
+    </td>
+    <td class="tableinfo">
+      Paramiko: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=205777">
+
+        205777
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-06.xml">
+        200803-06
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-text/sword
+    </td>
+    <td class="tableinfo">
+      SWORD: Shell command injection
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=210754">
+        210754
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-05.xml">
+
+        200803-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-misc/splitvt
+    </td>
+    <td class="tableinfo">
+
+      SplitVT: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=211240">
+        211240
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-04.xml">
+        200803-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apps/mantisbt
+    </td>
+
+    <td class="tableinfo">
+      Mantis: Cross-Site Scripting
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=203791">
+        203791
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-03.xml">
+        200803-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-sound/audacity
+    </td>
+    <td class="tableinfo">
+      Audacity: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=199751">
+        199751
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-02.xml">
+        200803-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      dev-db/firebird
+    </td>
+    <td class="tableinfo">
+      Firebird: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=208034">
+        208034
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200803-01.xml">
+        200803-01
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/acroread
+    </td>
+    <td class="tableinfo">
+      Adobe Acrobat Reader: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170177">
+
+        170177
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-12.xml">
+        200802-12
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/xine-lib
+    </td>
+    <td class="tableinfo">
+      xine-lib: User-assisted execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=209106">
+        209106
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-11.xml">
+
+        200802-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/asterisk
+    </td>
+    <td class="tableinfo">
+
+      Asterisk: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185713">
+        185713
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-10.xml">
+        200802-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/python
+    </td>
+
+    <td class="tableinfo">
+      Python: PCRE Integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198373">
+        198373
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-09.xml">
+        200802-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=209915">
+        209915
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-08.xml">
+        200802-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-libs/boost
+    </td>
+    <td class="tableinfo">
+      Boost: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=205955">
+        205955
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-07.xml">
+        200802-07
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      media-sound/pulseaudio
+    </td>
+    <td class="tableinfo">
+      Pulseaudio: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=207214">
+
+        207214
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-06.xml">
+        200802-06
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/scponly
+    </td>
+    <td class="tableinfo">
+      scponly: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=201726">
+        201726
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-05.xml">
+
+        200802-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/gnumeric
+    </td>
+    <td class="tableinfo">
+
+      Gnumeric: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=208356">
+        208356
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-04.xml">
+        200802-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/gallery
+    </td>
+
+    <td class="tableinfo">
+      Gallery: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=203217">
+        203217
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-03.xml">
+        200802-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-apps/horde-imp
+    </td>
+    <td class="tableinfo">
+      Horde IMP: Security bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=205377">
+        205377
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-02.xml">
+        200802-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      games-fps/doomsday
+    </td>
+    <td class="tableinfo">
+      Doomsday: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=190835">
+        190835
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200802-01.xml">
+        200802-01
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/sdl-image
+    </td>
+    <td class="tableinfo">
+      SDL_image: Two buffer overflow vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=207933">
+
+        207933
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-22.xml">
+        200801-22
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      media-sound/peercast
+    </td>
+    <td class="tableinfo">
+      PeerCast: Buffer overflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=202747">
+        202747
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-21.xml">
+
+        200801-21
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      x11-misc/xdg-utils
+    </td>
+    <td class="tableinfo">
+
+      Xdg-Utils: Arbitrary command execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=207331">
+        207331
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-20.xml">
+        200801-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/libxml2
+    </td>
+
+    <td class="tableinfo">
+      libxml2: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=202628">
+        202628
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-19.xml">
+        200801-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      x11-libs/goffice
+    </td>
+    <td class="tableinfo">
+      GOffice: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198385">
+        198385
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-18.xml">
+        200801-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      www-client/kazehakase
+    </td>
+    <td class="tableinfo">
+      Kazehakase: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198983">
+        198983
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-17.xml">
+        200801-17
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-ftp/netkit-ftpd
+    </td>
+    <td class="tableinfo">
+      Netkit FTP Server: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=199206">
+
+        199206
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-16.xml">
+        200801-16
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/maradns
+    </td>
+    <td class="tableinfo">
+      MaraDNS: CNAME Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=204351">
+        204351
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-15.xml">
+
+        200801-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-db/postgresql
+    </td>
+    <td class="tableinfo">
+
+      PostgreSQL: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=204760">
+        204760
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-14.xml">
+        200801-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-news/blam
+    </td>
+
+    <td class="tableinfo">
+      Blam: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=199841">
+        199841
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-13.xml">
+        200801-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-irc/ngircd
+    </td>
+    <td class="tableinfo">
+      ngIRCd: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=204834">
+        204834
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-12.xml">
+        200801-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/xine-lib
+    </td>
+    <td class="tableinfo">
+      xine-lib: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=205197">
+        205197
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-11.xml">
+        200801-11
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-python/cherrypy
+    </td>
+    <td class="tableinfo">
+      CherryPy: Directory traversal vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=204829">
+
+        204829
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-10.xml">
+        200801-10
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apps/tikiwiki
+    </td>
+    <td class="tableinfo">
+      TikiWiki: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=203265">
+        203265
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-09.xml">
+
+        200801-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      x11-base/xorg-server (and 1 <a href="http://security.gentoo.org/glsa/glsa-200801-09.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      X.Org X server and Xfont library: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=204362">
+        204362
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-08.xml">
+        200801-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-libs/libcdio
+    </td>
+    <td class="tableinfo">
+      libcdio: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=203777">
+        203777
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-07.xml">
+        200801-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-www/netscape-flash
+    </td>
+    <td class="tableinfo">
+      Adobe Flash Player: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=193519">
+        193519
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-06.xml">
+        200801-06
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      xfce-base/xfce4-panel (and 1 <a href="http://security.gentoo.org/glsa/glsa-200801-06.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Xfce: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=201292">
+        201292
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-05.xml">
+        200801-05
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-proxy/squid
+    </td>
+    <td class="tableinfo">
+      Squid: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=201209">
+        201209
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-04.xml">
+
+        200801-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-fs/openafs
+    </td>
+    <td class="tableinfo">
+
+      OpenAFS: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=203573">
+        203573
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-03.xml">
+        200801-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/claws-mail
+    </td>
+
+    <td class="tableinfo">
+      Claws Mail: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=201244">
+        201244
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-02.xml">
+        200801-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-lang/R
+    </td>
+    <td class="tableinfo">
+      R: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198976">
+        198976
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200801-01.xml">
+        200801-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-arch/unp
+    </td>
+    <td class="tableinfo">
+      unp: Arbitrary command execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=203106">
+        203106
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-25.xml">
+        200712-25
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/openoffice (and 2 <a href="http://security.gentoo.org/glsa/glsa-200712-25.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      OpenOffice.org: User-assisted arbitrary code execution
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=200771">
+        200771
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-24.xml">
+        200712-24
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-emulation/emul-linux-x86-gtklibs
+    </td>
+    <td class="tableinfo">
+      AMD64 x86 emulation GTK+ library: User-assisted execution of arbitrary cod
+      e
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=201860">
+        201860
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-23.xml">
+
+        200712-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/wireshark
+    </td>
+    <td class="tableinfo">
+
+      Wireshark: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=199958">
+        199958
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-22.xml">
+        200712-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/opera
+    </td>
+
+    <td class="tableinfo">
+      Opera: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=202770">
+        202770
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-21.xml">
+        200712-21
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-client/mozilla-firefox (and 3 <a href="http://security.gentoo.org/glsa/glsa-200712-21.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox, SeaMonkey: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198965">
+        198965
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-20.xml">
+        200712-20
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=202762">
+
+        202762
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-19.xml">
+        200712-19
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-admin/syslog-ng
+    </td>
+    <td class="tableinfo">
+      Syslog-ng: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=202718">
+        202718
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-18.xml">
+
+        200712-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      media-sound/mt-daapd
+    </td>
+    <td class="tableinfo">
+
+      Multi-Threaded DAAP Daemon: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=200110">
+        200110
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-17.xml">
+        200712-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/exiftags
+    </td>
+
+    <td class="tableinfo">
+      exiftags: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=202354">
+        202354
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-16.xml">
+        200712-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-gfx/exiv2
+    </td>
+    <td class="tableinfo">
+      Exiv2: Integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=202351">
+        202351
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-15.xml">
+        200712-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/libexif
+    </td>
+    <td class="tableinfo">
+      libexif: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=202350">
+        202350
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-14.xml">
+        200712-14
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-print/cups
+    </td>
+    <td class="tableinfo">
+      CUPS: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=199195">
+
+        199195
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-13.xml">
+        200712-13
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sys-fs/e2fsprogs
+    </td>
+    <td class="tableinfo">
+      E2fsprogs: Multiple buffer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=201546">
+        201546
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-12.xml">
+
+        200712-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-irc/ircservices
+    </td>
+    <td class="tableinfo">
+
+      IRC Services: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=199897">
+        199897
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-11.xml">
+        200712-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sys-apps/portage
+    </td>
+
+    <td class="tableinfo">
+      Portage: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=193589">
+        193589
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-10.xml">
+        200712-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      net-fs/samba
+    </td>
+    <td class="tableinfo">
+      Samba: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=200773">
+        200773
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-09.xml">
+        200712-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-ruby/ruby-gtk2
+    </td>
+    <td class="tableinfo">
+      Ruby-GNOME2: Format string error
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=200623">
+        200623
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-08.xml">
+        200712-08
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-emulation/emul-linux-x86-qtlibs
+    </td>
+    <td class="tableinfo">
+      AMD64 x86 emulation Qt library: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189536">
+
+        189536
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-07.xml">
+        200712-07
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-emacs/lookup
+    </td>
+    <td class="tableinfo">
+      Lookup: Insecure temporary file creation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=197306">
+        197306
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-06.xml">
+
+        200712-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-db/firebird
+    </td>
+    <td class="tableinfo">
+
+      Firebird: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195569">
+        195569
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-05.xml">
+        200712-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-php/PEAR-MDB2
+    </td>
+
+    <td class="tableinfo">
+      PEAR::MDB2: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198446">
+        198446
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-04.xml">
+        200712-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      x11-libs/cairo
+    </td>
+    <td class="tableinfo">
+      Cairo: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=200350">
+        200350
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-03.xml">
+        200712-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-editors/emacs
+    </td>
+    <td class="tableinfo">
+      GNU Emacs: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=197958">
+        197958
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-02.xml">
+        200712-02
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-analyzer/cacti
+    </td>
+    <td class="tableinfo">
+      Cacti: SQL injection
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=199509">
+
+        199509
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200712-01.xml">
+        200712-01
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/hugin
+    </td>
+    <td class="tableinfo">
+      Hugin: Insecure temporary file creation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195996">
+        195996
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-34.xml">
+
+        200711-34
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/cstetex
+    </td>
+    <td class="tableinfo">
+
+      CSTeX: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196673">
+        196673
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-33.xml">
+        200711-33
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      sys-auth/nss_ldap
+    </td>
+
+    <td class="tableinfo">
+      nss_ldap: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198390">
+        198390
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-32.xml">
+        200711-32
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-tex/feynmf
+    </td>
+    <td class="tableinfo">
+      Feynmf: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198231">
+        198231
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-31.xml">
+        200711-31
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-analyzer/net-snmp
+    </td>
+    <td class="tableinfo">
+      Net-SNMP: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198346">
+        198346
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-30.xml">
+        200711-30
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/libpcre
+    </td>
+    <td class="tableinfo">
+      PCRE: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198198">
+
+        198198
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-29.xml">
+        200711-29
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-fs/samba
+    </td>
+    <td class="tableinfo">
+      Samba: Execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=197519">
+        197519
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-28.xml">
+
+        200711-28
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/perl
+    </td>
+    <td class="tableinfo">
+
+      Perl: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198196">
+        198196
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-27.xml">
+        200711-27
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/link-grammar
+    </td>
+
+    <td class="tableinfo">
+      Link Grammar: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196803">
+        196803
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-26.xml">
+        200711-26
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-text/tetex
+    </td>
+    <td class="tableinfo">
+      teTeX: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198238">
+        198238
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-25.xml">
+        200711-25
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-db/mysql
+    </td>
+    <td class="tableinfo">
+      MySQL: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198988">
+        198988
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-24.xml">
+        200711-24
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/mozilla-thunderbird (and 1 <a href="http://security.gentoo.org/glsa/glsa-200711-24.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Thunderbird: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196481">
+        196481
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-23.xml">
+        200711-23
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-emulation/vmware-workstation (and 1 <a href="http://security.gentoo.org/glsa/glsa-200711-23.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      VMware Workstation and Player: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=193196">
+        193196
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-22.xml">
+
+        200711-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/poppler (and 4 <a href="http://security.gentoo.org/glsa/glsa-200711-22.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Poppler, KDE: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196735">
+        196735
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-21.xml">
+        200711-21
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      app-emulation/bochs
+    </td>
+    <td class="tableinfo">
+      Bochs: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=188148">
+        188148
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-20.xml">
+        200711-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      games-board/pioneers
+    </td>
+    <td class="tableinfo">
+      Pioneers: Multiple Denials of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=198807">
+        198807
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-19.xml">
+        200711-19
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/tikiwiki
+    </td>
+    <td class="tableinfo">
+      TikiWiki: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195503">
+
+        195503
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-18.xml">
+        200711-18
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-arch/cpio
+    </td>
+    <td class="tableinfo">
+      Cpio: Buffer overflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196978">
+        196978
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-17.xml">
+
+        200711-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-ruby/rails
+    </td>
+    <td class="tableinfo">
+
+      Ruby on Rails: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195315">
+        195315
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-16.xml">
+        200711-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-print/cups
+    </td>
+
+    <td class="tableinfo">
+      CUPS: Memory corruption
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196736">
+        196736
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-15.xml">
+        200711-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-libs/flac
+    </td>
+    <td class="tableinfo">
+      FLAC: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195700">
+        195700
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-14.xml">
+        200711-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 4 <a href="http://security.gentoo.org/glsa/glsa-200711-14.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox, SeaMonkey, XULRunner: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196480">
+        196480
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-13.xml">
+        200711-13
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-proxy/3proxy
+    </td>
+    <td class="tableinfo">
+      3proxy: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196772">
+
+        196772
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-12.xml">
+        200711-12
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-misc/tomboy
+    </td>
+    <td class="tableinfo">
+      Tomboy: User-assisted execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189249">
+        189249
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-11.xml">
+
+        200711-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/nagios-plugins
+    </td>
+    <td class="tableinfo">
+
+      Nagios Plugins: Two buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196308">
+        196308
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-10.xml">
+        200711-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-lang/mono
+    </td>
+
+    <td class="tableinfo">
+      Mono: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=197067">
+        197067
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-09.xml">
+        200711-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-wireless/madwifi-ng
+    </td>
+    <td class="tableinfo">
+      MadWifi: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195705">
+        195705
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-08.xml">
+        200711-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/libpng
+    </td>
+    <td class="tableinfo">
+      libpng: Multiple Denials of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195261">
+        195261
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-07.xml">
+        200711-07
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/python
+    </td>
+    <td class="tableinfo">
+      Python: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=192876">
+
+        192876
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-06.xml">
+        200711-06
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-servers/apache
+    </td>
+    <td class="tableinfo">
+      Apache: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=186219">
+        186219
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-05.xml">
+
+        200711-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/sitebar
+    </td>
+    <td class="tableinfo">
+
+      SiteBar: Multiple issues
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195810">
+        195810
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-04.xml">
+        200711-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      gnome-extra/evolution-data-server
+    </td>
+
+    <td class="tableinfo">
+      Evolution: User-assisted remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=190861">
+        190861
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-03.xml">
+        200711-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+
+      www-apps/gallery
+    </td>
+    <td class="tableinfo">
+      Gallery: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=191587">
+        191587
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-02.xml">
+        200711-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+
+    <td class="tableinfo">
+      net-misc/openssh
+    </td>
+    <td class="tableinfo">
+      OpenSSH: Security bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=191321">
+        191321
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200711-01.xml">
+        200711-01
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-ftp/gftp
+    </td>
+    <td class="tableinfo">
+      gFTP: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=188252">
+
+        188252
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-31.xml">
+        200710-31
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/opera
+    </td>
+    <td class="tableinfo">
+      Opera: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=196164">
+        196164
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-30.xml">
+
+        200710-30
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-libs/openssl
+    </td>
+    <td class="tableinfo">
+
+      OpenSSL: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195634">
+        195634
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-29.xml">
+        200710-29
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/sylpheed (and 1 <a href="http://security.gentoo.org/glsa/glsa-200710-29.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Sylpheed, Claws Mail: User-assisted remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=190104">
+        190104
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-28.xml">
+        200710-28
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      x11-libs/qt
+    </td>
+    <td class="tableinfo">
+      Qt: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=192472">
+        192472
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-27.xml">
+        200710-27
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-gfx/imagemagick
+    </td>
+    <td class="tableinfo">
+      ImageMagick: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=186030">
+        186030
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-26.xml">
+        200710-26
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-print/hplip
+    </td>
+    <td class="tableinfo">
+      HPLIP: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195565">
+
+        195565
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-25.xml">
+        200710-25
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-p2p/mldonkey
+    </td>
+    <td class="tableinfo">
+      MLDonkey: Privilege escalation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189412">
+        189412
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-24.xml">
+
+        200710-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/openoffice (and 1 <a href="http://security.gentoo.org/glsa/glsa-200710-24.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      OpenOffice.org: Heap-based buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=192818">
+        192818
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-23.xml">
+        200710-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+
+      app-arch/star
+    </td>
+    <td class="tableinfo">
+      Star: Directory traversal vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189690">
+        189690
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-22.xml">
+        200710-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-emacs/tramp
+    </td>
+    <td class="tableinfo">
+      TRAMP: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=194713">
+        194713
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-21.xml">
+        200710-21
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/tikiwiki
+    </td>
+    <td class="tableinfo">
+      TikiWiki: Arbitrary command execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195503">
+
+        195503
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-20.xml">
+        200710-20
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      gnustep-libs/pdfkit (and 1 <a href="http://security.gentoo.org/glsa/glsa-200710-20.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      PDFKit, ImageKits: Buffer overflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=188185">
+        188185
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-19.xml">
+
+        200710-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-forensics/sleuthkit
+    </td>
+    <td class="tableinfo">
+
+      The Sleuth Kit: Integer underflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=181977">
+        181977
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-18.xml">
+        200710-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      sys-apps/util-linux
+    </td>
+
+    <td class="tableinfo">
+      util-linux: Local privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=195390">
+        195390
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-17.xml">
+        200710-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      mail-client/balsa
+    </td>
+    <td class="tableinfo">
+      Balsa: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=193179">
+        193179
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-16.xml">
+        200710-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      x11-base/xorg-server
+    </td>
+    <td class="tableinfo">
+      X.Org X server: Composite local privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=191964">
+        191964
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-15.xml">
+        200710-15
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      kde-base/kdm (and 1 <a href="http://security.gentoo.org/glsa/glsa-200710-15.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      KDM: Local privilege escalation
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=192373">
+        192373
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-14.xml">
+        200710-14
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-admin/denyhosts
+    </td>
+    <td class="tableinfo">
+      DenyHosts: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=181213">
+        181213
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-13.xml">
+
+        200710-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apps/ampache
+    </td>
+    <td class="tableinfo">
+
+      Ampache: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189607">
+        189607
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-12.xml">
+        200710-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/t1lib
+    </td>
+
+    <td class="tableinfo">
+      T1Lib: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=193437">
+        193437
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-11.xml">
+        200710-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      x11-apps/xfs
+    </td>
+    <td class="tableinfo">
+      X Font Server: Multiple Vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185660">
+        185660
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-10.xml">
+        200710-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-i18n/skktools
+    </td>
+    <td class="tableinfo">
+      SKK Tools: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=193121">
+        193121
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-09.xml">
+        200710-09
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/nx (and 1 <a href="http://security.gentoo.org/glsa/glsa-200710-09.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      NX 2.1: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=192712">
+        192712
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-08.xml">
+        200710-08
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/koffice (and 3 <a href="http://security.gentoo.org/glsa/glsa-200710-08.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      KOffice, KWord, KPDF, KDE Graphics Libraries: Stack-based buffer overflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=187139">
+        187139
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-07.xml">
+
+        200710-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/tk
+    </td>
+    <td class="tableinfo">
+
+      Tk: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=192539">
+        192539
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-06.xml">
+        200710-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-libs/openssl
+    </td>
+
+    <td class="tableinfo">
+      OpenSSL: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=188799">
+        188799
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-05.xml">
+        200710-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-util/qgit
+    </td>
+    <td class="tableinfo">
+      QGit: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=190697">
+        190697
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-04.xml">
+        200710-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/libsndfile
+    </td>
+    <td class="tableinfo">
+      libsndfile: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=192834">
+        192834
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-03.xml">
+        200710-03
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libvorbis
+    </td>
+    <td class="tableinfo">
+      libvorbis: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=186716">
+
+        186716
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-02.xml">
+        200710-02
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-lang/php
+    </td>
+    <td class="tableinfo">
+      PHP: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=179158">
+        179158
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200710-01.xml">
+
+        200710-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-libs/librpcsecgss
+    </td>
+    <td class="tableinfo">
+
+      RPCSEC_GSS library: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=191479">
+        191479
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-18.xml">
+        200709-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/bugzilla
+    </td>
+
+    <td class="tableinfo">
+      Bugzilla: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=190112">
+        190112
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-17.xml">
+        200709-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-text/tetex
+    </td>
+    <td class="tableinfo">
+      teTeX: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170861">
+        170861
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-16.xml">
+        200709-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      www-servers/lighttpd
+    </td>
+    <td class="tableinfo">
+      Lighttpd: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=191912">
+        191912
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-15.xml">
+        200709-15
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-java/jrockit-jdk-bin
+    </td>
+    <td class="tableinfo">
+      BEA JRockit: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=190686">
+
+        190686
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-14.xml">
+        200709-14
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189912">
+        189912
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-13.xml">
+
+        200709-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/rsync
+    </td>
+    <td class="tableinfo">
+
+      rsync: Two buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189132">
+        189132
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-12.xml">
+        200709-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/poppler
+    </td>
+
+    <td class="tableinfo">
+      Poppler: Two buffer overflow vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=188863">
+        188863
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-11.xml">
+        200709-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+
+      gnome-base/gdm
+    </td>
+    <td class="tableinfo">
+      GDM: Local Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=187919">
+        187919
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-10.xml">
+        200709-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+
+    <td class="tableinfo">
+      www-apps/phpwiki
+    </td>
+    <td class="tableinfo">
+      PhpWiki: Authentication bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=181692">
+        181692
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-09.xml">
+        200709-09
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-arch/tar
+    </td>
+    <td class="tableinfo">
+      GNU Tar: Directory traversal vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189682">
+
+        189682
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-08.xml">
+        200709-08
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/id3lib
+    </td>
+    <td class="tableinfo">
+      id3lib: Insecure temporary file creation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189610">
+        189610
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-07.xml">
+
+        200709-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-irc/eggdrop
+    </td>
+    <td class="tableinfo">
+
+      Eggdrop: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=179354">
+        179354
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-06.xml">
+        200709-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/flac123
+    </td>
+
+    <td class="tableinfo">
+      flac123: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=186220">
+        186220
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-05.xml">
+        200709-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-video/realplayer
+    </td>
+    <td class="tableinfo">
+      RealPlayer: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=183421">
+        183421
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-04.xml">
+        200709-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/po4a
+    </td>
+    <td class="tableinfo">
+      po4a: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=189440">
+        189440
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-03.xml">
+        200709-03
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/streamripper
+    </td>
+    <td class="tableinfo">
+      Streamripper: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=188698">
+
+        188698
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-02.xml">
+        200709-02
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-irc/kvirc
+    </td>
+    <td class="tableinfo">
+      KVIrc: Remote arbitrary code execution
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=183174">
+        183174
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200709-01.xml">
+
+        200709-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-crypt/mit-krb5
+    </td>
+    <td class="tableinfo">
+
+      MIT Kerberos 5: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=191301">
+        191301
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-17.xml">
+        200708-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/opera
+    </td>
+
+    <td class="tableinfo">
+      Opera: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185497">
+        185497
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-16.xml">
+        200708-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      x11-libs/qt
+    </td>
+    <td class="tableinfo">
+      Qt: Multiple format string vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185446">
+        185446
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-15.xml">
+        200708-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+
+    <td class="tableinfo">
+      www-apache/mod_jk
+    </td>
+    <td class="tableinfo">
+      Apache mod_jk: Directory traversal
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=186218">
+        186218
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-14.xml">
+        200708-14
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      x11-drivers/nvidia-drivers
+    </td>
+    <td class="tableinfo">
+      NVIDIA drivers: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=183567">
+
+        183567
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-13.xml">
+        200708-13
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/bind
+    </td>
+    <td class="tableinfo">
+      BIND: Weak random number generation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=186556">
+        186556
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-12.xml">
+
+        200708-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-analyzer/wireshark
+    </td>
+    <td class="tableinfo">
+
+      Wireshark: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=183520">
+        183520
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-11.xml">
+        200708-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-servers/lighttpd
+    </td>
+
+    <td class="tableinfo">
+      Lighttpd: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185442">
+        185442
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-10.xml">
+        200708-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-db/mysql
+    </td>
+    <td class="tableinfo">
+      MySQL: Denial of Service and information leakage
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185333">
+        185333
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-09.xml">
+        200708-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 6 <a href="http://security.gentoo.org/glsa/glsa-200708-09.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla products: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185737">
+        185737
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-08.xml">
+        200708-08
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      mail-client/squirrelmail
+    </td>
+    <td class="tableinfo">
+      SquirrelMail G/PGP plugin: Arbitrary code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185010">
+
+        185010
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-07.xml">
+        200708-07
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      x11-terms/terminal
+    </td>
+    <td class="tableinfo">
+      Xfce Terminal: Remote arbitrary code execution
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=184886">
+        184886
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-06.xml">
+
+        200708-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-perl/Net-DNS
+    </td>
+    <td class="tableinfo">
+
+      Net::DNS: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=184029">
+        184029
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-05.xml">
+        200708-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/gd
+    </td>
+
+    <td class="tableinfo">
+      GD: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=179154">
+        179154
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-04.xml">
+        200708-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185013">
+        185013
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-03.xml">
+        200708-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-arch/libarchive
+    </td>
+    <td class="tableinfo">
+      libarchive (formerly named as bsdtar): Multiple PaX Extension Header Vulne
+      rabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=184984">
+        184984
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-02.xml">
+        200708-02
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/xvid
+    </td>
+    <td class="tableinfo">
+      Xvid: Array indexing vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=183145">
+
+        183145
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200708-01.xml">
+        200708-01
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-www/netscape-flash
+    </td>
+    <td class="tableinfo">
+      Macromedia Flash Player: Remote arbitrary code execution
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=185141">
+        185141
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-14.xml">
+
+        200707-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/tcpdump
+    </td>
+    <td class="tableinfo">
+
+      tcpdump: Integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=184815">
+        184815
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-13.xml">
+        200707-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-analyzer/fail2ban
+    </td>
+
+    <td class="tableinfo">
+      Fail2ban: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=181214">
+        181214
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-12.xml">
+        200707-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-video/vlc
+    </td>
+    <td class="tableinfo">
+      VLC media player: Format string vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=182389">
+        182389
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-11.xml">
+        200707-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      app-crypt/mit-krb5
+    </td>
+    <td class="tableinfo">
+      MIT Kerberos 5: Arbitrary remote code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=183338">
+        183338
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-10.xml">
+        200707-10
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      app-accessibility/festival
+    </td>
+    <td class="tableinfo">
+      Festival: Privilege elevation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170477">
+
+        170477
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-09.xml">
+        200707-09
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/gimp
+    </td>
+    <td class="tableinfo">
+      GIMP: Multiple integer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=182047">
+        182047
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-08.xml">
+
+        200707-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/nvclock
+    </td>
+    <td class="tableinfo">
+
+      NVClock: Insecure file usage
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=184071">
+        184071
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-07.xml">
+        200707-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/mplayer
+    </td>
+
+    <td class="tableinfo">
+      MPlayer: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=181097">
+        181097
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-06.xml">
+        200707-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      x11-misc/xnview
+    </td>
+    <td class="tableinfo">
+      XnView: Stack-based buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=175670">
+        175670
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-05.xml">
+        200707-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+
+    <td class="tableinfo">
+      app-admin/webmin (and 1 <a href="http://security.gentoo.org/glsa/glsa-200707-05.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Webmin, Usermin: Cross-site scripting vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=181385">
+        181385
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-04.xml">
+        200707-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      sys-libs/glibc
+    </td>
+    <td class="tableinfo">
+      GNU C Library: Integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=183844">
+
+        183844
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-03.xml">
+        200707-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      gnome-extra/evolution-data-server
+    </td>
+    <td class="tableinfo">
+      Evolution: User-assisted remote execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=182011">
+        182011
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-02.xml">
+
+        200707-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/openoffice (and 1 <a href="http://security.gentoo.org/glsa/glsa-200707-02.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      OpenOffice.org: Two buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=181773">
+        181773
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200707-01.xml">
+        200707-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      dev-db/firebird
+    </td>
+    <td class="tableinfo">
+      Firebird: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=181811">
+        181811
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200706-09.xml">
+        200706-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/libexif
+    </td>
+    <td class="tableinfo">
+      libexif: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=181922">
+        181922
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200706-08.xml">
+        200706-08
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-emulation/emul-linux-x86-java
+    </td>
+    <td class="tableinfo">
+      emul-linux-x86-java: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=178962">
+
+        178962
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200706-07.xml">
+        200706-07
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/phprojekt
+    </td>
+    <td class="tableinfo">
+      PHProjekt: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170905">
+        170905
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200706-06.xml">
+
+        200706-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 6 <a href="http://security.gentoo.org/glsa/glsa-200706-06.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Mozilla products: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=180436">
+        180436
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200706-05.xml">
+        200706-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple Denials of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=178082">
+        178082
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200706-04.xml">
+        200706-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      net-wireless/madwifi-ng
+    </td>
+    <td class="tableinfo">
+      MadWifi: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=179532">
+        179532
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200706-03.xml">
+        200706-03
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/elinks
+    </td>
+    <td class="tableinfo">
+      ELinks: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=177512">
+
+        177512
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200706-02.xml">
+        200706-02
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/evolution
+    </td>
+    <td class="tableinfo">
+      Evolution: User-assisted execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170879">
+        170879
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200706-01.xml">
+
+        200706-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libexif
+    </td>
+    <td class="tableinfo">
+
+      libexif: Integer overflow vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=178081">
+        178081
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-25.xml">
+        200705-25
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      sys-apps/file
+    </td>
+
+    <td class="tableinfo">
+      file: Integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=179583">
+        179583
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-24.xml">
+        200705-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-libs/libpng
+    </td>
+    <td class="tableinfo">
+      libpng: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=178004">
+        178004
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-23.xml">
+        200705-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-java/sun-jdk (and 1 <a href="http://security.gentoo.org/glsa/glsa-200705-23.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Sun JDK/JRE: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=176675">
+        176675
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-22.xml">
+        200705-22
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/freetype
+    </td>
+    <td class="tableinfo">
+      FreeType: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=179161">
+
+        179161
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-21.xml">
+        200705-21
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/mplayer
+    </td>
+    <td class="tableinfo">
+      MPlayer: Two buffer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=168917">
+        168917
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-20.xml">
+
+        200705-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-java/blackdown-jdk (and 1 <a href="http://security.gentoo.org/glsa/glsa-200705-20.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Blackdown Java: Applet privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=161835">
+        161835
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-19.xml">
+        200705-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      dev-lang/php
+    </td>
+    <td class="tableinfo">
+      PHP: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=169372">
+        169372
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-18.xml">
+        200705-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-dialup/pptpd
+    </td>
+    <td class="tableinfo">
+      PPTPD: Denial of Service attack
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=176936">
+        176936
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-17.xml">
+        200705-17
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apache/mod_security
+    </td>
+    <td class="tableinfo">
+      Apache mod_security: Rule bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=169778">
+
+        169778
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-16.xml">
+        200705-16
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/phpwiki
+    </td>
+    <td class="tableinfo">
+      PhpWiki: Remote execution of arbitrary code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=174451">
+        174451
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-15.xml">
+
+        200705-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-fs/samba
+    </td>
+    <td class="tableinfo">
+
+      Samba: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=177029">
+        177029
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-14.xml">
+        200705-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      x11-misc/xscreensaver
+    </td>
+
+    <td class="tableinfo">
+      XScreenSaver: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=176584">
+        176584
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-13.xml">
+        200705-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-gfx/imagemagick
+    </td>
+    <td class="tableinfo">
+      ImageMagick: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=152672">
+        152672
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-12.xml">
+        200705-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-db/postgresql
+    </td>
+    <td class="tableinfo">
+      PostgreSQL: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=175791">
+        175791
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-11.xml">
+        200705-11
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-db/mysql
+    </td>
+    <td class="tableinfo">
+      MySQL: Two Denial of Service vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170126">
+
+        170126
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-10.xml">
+        200705-10
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/tightvnc (and 1 <a href="http://security.gentoo.org/glsa/glsa-200705-10.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      LibXfont, TightVNC: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=172575">
+        172575
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-09.xml">
+
+        200705-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-firewall/ipsec-tools
+    </td>
+    <td class="tableinfo">
+
+      IPsec-Tools: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=173219">
+        173219
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-08.xml">
+        200705-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/gimp
+    </td>
+
+    <td class="tableinfo">
+      GIMP: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=176226">
+        176226
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-07.xml">
+        200705-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-servers/lighttpd
+    </td>
+    <td class="tableinfo">
+      Lighttpd: Two Denials of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=174043">
+        174043
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-06.xml">
+        200705-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      x11-libs/libX11
+    </td>
+    <td class="tableinfo">
+      X.Org X11 library: Multiple integer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=172752">
+        172752
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-05.xml">
+        200705-05
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/quagga
+    </td>
+    <td class="tableinfo">
+      Quagga: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=174206">
+
+        174206
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-04.xml">
+        200705-04
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apache/mod_perl
+    </td>
+    <td class="tableinfo">
+      Apache mod_perl: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=172676">
+        172676
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-03.xml">
+
+        200705-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      www-servers/tomcat
+    </td>
+    <td class="tableinfo">
+
+      Tomcat: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=173122">
+        173122
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-02.xml">
+        200705-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/freetype
+    </td>
+
+    <td class="tableinfo">
+      FreeType: User-assisted execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=172577">
+        172577
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200705-01.xml">
+        200705-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-p2p/ktorrent
+    </td>
+    <td class="tableinfo">
+      Ktorrent: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170303">
+        170303
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-23.xml">
+        200704-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      net-dialup/capi4k-utils
+    </td>
+    <td class="tableinfo">
+      capi4k-utils: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170870">
+        170870
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-22.xml">
+        200704-22
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Low
+    </td>
+    <td class="tableinfo">
+      media-sound/beast
+    </td>
+    <td class="tableinfo">
+      BEAST: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=163146">
+
+        163146
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-21.xml">
+        200704-21
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=174375">
+        174375
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-20.xml">
+
+        200704-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      media-libs/nas
+    </td>
+    <td class="tableinfo">
+
+      NAS: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=171428">
+        171428
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-19.xml">
+        200704-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/blender
+    </td>
+
+    <td class="tableinfo">
+      Blender: User-assisted remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=168907">
+        168907
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-18.xml">
+        200704-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      net-mail/courier-imap
+    </td>
+    <td class="tableinfo">
+      Courier-IMAP: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=168196">
+        168196
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-17.xml">
+        200704-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      net-proxy/3proxy
+    </td>
+    <td class="tableinfo">
+      3proxy: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=174429">
+        174429
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-16.xml">
+        200704-16
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-wireless/aircrack-ng
+    </td>
+    <td class="tableinfo">
+      Aircrack-ng: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=174340">
+
+        174340
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-15.xml">
+        200704-15
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-wireless/madwifi-ng
+    </td>
+    <td class="tableinfo">
+      MadWifi: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=173434">
+        173434
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-14.xml">
+
+        200704-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dialup/freeradius
+    </td>
+    <td class="tableinfo">
+
+      FreeRADIUS: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=174292">
+        174292
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-13.xml">
+        200704-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sys-apps/file
+    </td>
+
+    <td class="tableinfo">
+      File: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=174217">
+        174217
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-12.xml">
+        200704-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-office/openoffice (and 1 <a href="http://security.gentoo.org/glsa/glsa-200704-12.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      OpenOffice.org: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170828">
+        170828
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-11.xml">
+        200704-11
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Low
+    </td>
+    <td class="tableinfo">
+      sys-process/vixie-cron
+    </td>
+    <td class="tableinfo">
+      Vixie Cron: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=164466">
+
+        164466
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-10.xml">
+        200704-10
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/inkscape
+    </td>
+    <td class="tableinfo">
+      Inkscape: Two format string vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=171799">
+        171799
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-09.xml">
+
+        200704-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/xine-lib
+    </td>
+    <td class="tableinfo">
+
+      xine-lib: Heap-based buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170208">
+        170208
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-08.xml">
+        200704-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apps/dokuwiki
+    </td>
+
+    <td class="tableinfo">
+      DokuWiki: Cross-site scripting vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=163781">
+        163781
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-07.xml">
+        200704-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-text/libwpd
+    </td>
+    <td class="tableinfo">
+      libwpd: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=169675">
+        169675
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-06.xml">
+        200704-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/evince
+    </td>
+    <td class="tableinfo">
+      Evince: Stack overflow in included gv code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=156573">
+        156573
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-05.xml">
+        200704-05
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/zziplib
+    </td>
+    <td class="tableinfo">
+      zziplib: Buffer Overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=171441">
+
+        171441
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-04.xml">
+        200704-04
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      sys-cluster/openpbs
+    </td>
+    <td class="tableinfo">
+      OpenPBS: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153495">
+        153495
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-03.xml">
+
+        200704-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-fs/openafs
+    </td>
+    <td class="tableinfo">
+
+      OpenAFS: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=171662">
+        171662
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-02.xml">
+        200704-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-crypt/mit-krb5
+    </td>
+
+    <td class="tableinfo">
+      MIT Kerberos 5: Arbitrary remote code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=171889">
+        171889
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200704-01.xml">
+        200704-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-misc/asterisk
+    </td>
+    <td class="tableinfo">
+      Asterisk: Two SIP Denial of Service vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=171467">
+        171467
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-28.xml">
+        200703-28
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-print/cups
+    </td>
+    <td class="tableinfo">
+      CUPS: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=170881">
+        170881
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-27.xml">
+        200703-27
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Low
+    </td>
+    <td class="tableinfo">
+      net-proxy/squid
+    </td>
+    <td class="tableinfo">
+      Squid: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=171681">
+
+        171681
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-26.xml">
+        200703-26
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      sys-apps/file
+    </td>
+    <td class="tableinfo">
+      file: Integer underflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=171452">
+        171452
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-25.xml">
+
+        200703-25
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-im/ekiga
+    </td>
+    <td class="tableinfo">
+
+      Ekiga: Format string vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=167643">
+        167643
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-24.xml">
+        200703-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/mgv
+    </td>
+
+    <td class="tableinfo">
+      mgv: Stack overflow in included gv code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154645">
+        154645
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-23.xml">
+        200703-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+
+      www-apps/wordpress
+    </td>
+    <td class="tableinfo">
+      WordPress: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=168529">
+        168529
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-22.xml">
+        200703-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-libs/nss
+    </td>
+    <td class="tableinfo">
+      Mozilla Network Security Service: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=165555">
+        165555
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-21.xml">
+        200703-21
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      dev-lang/php
+    </td>
+    <td class="tableinfo">
+      PHP: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153911">
+
+        153911
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-20.xml">
+        200703-20
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      app-admin/lsat
+    </td>
+    <td class="tableinfo">
+      LSAT: Insecure temporary file creation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159542">
+        159542
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-19.xml">
+
+        200703-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/ltsp
+    </td>
+    <td class="tableinfo">
+
+      LTSP: Authentication bypass in included LibVNCServer code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142661">
+        142661
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-18.xml">
+        200703-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/mozilla-thunderbird (and 1 <a href="http://security.gentoo.org/glsa/glsa-200703-18.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Mozilla Thunderbird: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=165555">
+        165555
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-17.xml">
+        200703-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      app-admin/ulogd
+    </td>
+    <td class="tableinfo">
+      ulogd: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=161882">
+        161882
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-16.xml">
+        200703-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      www-apache/mod_jk
+    </td>
+    <td class="tableinfo">
+      Apache JK Tomcat Connector: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=169433">
+        169433
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-15.xml">
+        200703-15
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-db/postgresql
+    </td>
+    <td class="tableinfo">
+      PostgreSQL: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=165482">
+
+        165482
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-14.xml">
+        200703-14
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/asterisk
+    </td>
+    <td class="tableinfo">
+      Asterisk: SIP Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=169616">
+        169616
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-13.xml">
+
+        200703-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/ssh
+    </td>
+    <td class="tableinfo">
+
+      SSH Communications Security's Secure Shell Server: SFTP privilege escalati
+      on
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=168584">
+        168584
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-12.xml">
+        200703-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-im/silc-server
+    </td>
+
+    <td class="tableinfo">
+      SILC Server: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=169599">
+        169599
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-11.xml">
+        200703-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-sound/amarok
+    </td>
+    <td class="tableinfo">
+      Amarok: User-assisted remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=166901">
+        166901
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-10.xml">
+        200703-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+
+    <td class="tableinfo">
+      kde-base/kdelibs
+    </td>
+    <td class="tableinfo">
+      KHTML: Cross-site scripting (XSS) vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=165606">
+        165606
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-09.xml">
+        200703-09
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/smb4k
+    </td>
+    <td class="tableinfo">
+      Smb4K: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=156152">
+
+        156152
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-08.xml">
+        200703-08
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/seamonkey (and 1 <a href="http://security.gentoo.org/glsa/glsa-200703-08.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      SeaMonkey: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=165555">
+        165555
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-07.xml">
+
+        200703-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/STLport
+    </td>
+    <td class="tableinfo">
+
+      STLport: Possible remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=165837">
+        165837
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-06.xml">
+        200703-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-emulation/emul-linux-x86-qtlibs
+    </td>
+
+    <td class="tableinfo">
+      AMD64 x86 emulation Qt library: Integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153704">
+        153704
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-05.xml">
+        200703-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-client/mozilla (and 1 <a href="http://security.gentoo.org/glsa/glsa-200703-05.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Suite: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135257">
+        135257
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-04.xml">
+        200703-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 1 <a href="http://security.gentoo.org/glsa/glsa-200703-04.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=165555">
+        165555
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-03.xml">
+        200703-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=167201">
+        167201
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-02.xml">
+
+        200703-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-filter/spamassassin
+    </td>
+    <td class="tableinfo">
+
+      SpamAssassin: Long URI Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=166969">
+        166969
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200703-01.xml">
+        200703-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/snort
+    </td>
+
+    <td class="tableinfo">
+      Snort: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=167730">
+        167730
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-12.xml">
+        200702-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-libs/chmlib
+    </td>
+    <td class="tableinfo">
+      CHMlib: User-assisted remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=163989">
+        163989
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-11.xml">
+        200702-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-video/mplayer
+    </td>
+    <td class="tableinfo">
+      MPlayer: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159727">
+        159727
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-10.xml">
+        200702-10
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      games-strategy/ufo2000
+    </td>
+    <td class="tableinfo">
+      UFO2000: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142392">
+
+        142392
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-09.xml">
+        200702-09
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      games-fps/nexuiz
+    </td>
+    <td class="tableinfo">
+      Nexuiz: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=166044">
+        166044
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-08.xml">
+
+        200702-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-emulation/emul-linux-x86-java
+    </td>
+    <td class="tableinfo">
+
+      AMD64 x86 emulation Sun's J2SE Development Kit: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159547">
+        159547
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-07.xml">
+        200702-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-java/sun-jdk (and 1 <a href="http://security.gentoo.org/glsa/glsa-200702-07.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Sun JDK/JRE: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=162511">
+        162511
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-06.xml">
+        200702-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-dns/bind
+    </td>
+    <td class="tableinfo">
+      BIND: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=163692">
+        163692
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-05.xml">
+        200702-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-analyzer/fail2ban
+    </td>
+    <td class="tableinfo">
+      Fail2ban: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=157166">
+        157166
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-04.xml">
+        200702-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-arch/rar (and 1 <a href="http://security.gentoo.org/glsa/glsa-200702-04.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      RAR, UnRAR: Buffer overflow
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=166440">
+        166440
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-03.xml">
+        200702-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-analyzer/snort
+    </td>
+    <td class="tableinfo">
+      Snort: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=161632">
+        161632
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-02.xml">
+
+        200702-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-ftp/proftpd
+    </td>
+    <td class="tableinfo">
+
+      ProFTPD: Local privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=158122">
+        158122
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200702-01.xml">
+        200702-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-fs/samba
+    </td>
+
+    <td class="tableinfo">
+      Samba: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=165549">
+        165549
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-28.xml">
+        200701-28
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+
+      www-servers/thttpd
+    </td>
+    <td class="tableinfo">
+      thttpd: Unauthenticated remote file access
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142047">
+        142047
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-27.xml">
+        200701-27
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      www-client/elinks
+    </td>
+    <td class="tableinfo">
+      ELinks: Arbitrary Samba command execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=155358">
+        155358
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-26.xml">
+        200701-26
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      kde-base/ksirc
+    </td>
+    <td class="tableinfo">
+      KSirc: Denial of Service vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159658">
+
+        159658
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-25.xml">
+        200701-25
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      x11-base/xorg-server
+    </td>
+    <td class="tableinfo">
+      X.Org X server: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=157421">
+        157421
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-24.xml">
+
+        200701-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/vlc
+    </td>
+    <td class="tableinfo">
+
+      VLC media player: Format string vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159845">
+        159845
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-23.xml">
+        200701-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/cacti
+    </td>
+
+    <td class="tableinfo">
+      Cacti: Command execution and SQL injection
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159278">
+        159278
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-22.xml">
+        200701-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-proxy/squid
+    </td>
+    <td class="tableinfo">
+      Squid: Multiple Denial of Service vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=162364">
+        162364
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-21.xml">
+        200701-21
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      app-crypt/mit-krb5
+    </td>
+    <td class="tableinfo">
+      MIT Kerberos 5: Arbitrary Remote Code Execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=158810">
+        158810
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-20.xml">
+        200701-20
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-im/centericq
+    </td>
+    <td class="tableinfo">
+      Centericq: Remote buffer overflow in LiveJournal handling
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=160793">
+
+        160793
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-19.xml">
+        200701-19
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      net-nds/openldap
+    </td>
+    <td class="tableinfo">
+      OpenLDAP: Insecure usage of /tmp during installation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159508">
+        159508
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-18.xml">
+
+        200701-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/xine-ui
+    </td>
+    <td class="tableinfo">
+
+      xine-ui: Format string vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=161558">
+        161558
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-17.xml">
+        200701-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      gnome-base/libgtop
+    </td>
+
+    <td class="tableinfo">
+      libgtop: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=162169">
+        162169
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-16.xml">
+        200701-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-text/acroread
+    </td>
+    <td class="tableinfo">
+      Adobe Acrobat Reader: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159874">
+        159874
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-15.xml">
+        200701-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-java/sun-jdk (and 1 <a href="http://security.gentoo.org/glsa/glsa-200701-15.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Sun JDK/JRE: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=158659">
+        158659
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-14.xml">
+        200701-14
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apache/mod_auth_kerb
+    </td>
+    <td class="tableinfo">
+      Mod_auth_kerb: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=155782">
+
+        155782
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-13.xml">
+        200701-13
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-mail/fetchmail
+    </td>
+    <td class="tableinfo">
+      Fetchmail: Denial of Service and password disclosure
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=160463">
+        160463
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-12.xml">
+
+        200701-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      dev-lang/mono
+    </td>
+    <td class="tableinfo">
+
+      Mono: Information disclosure
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159886">
+        159886
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-11.xml">
+        200701-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apps/horde-kronolith
+    </td>
+
+    <td class="tableinfo">
+      Kronolith: Local file inclusion
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=156627">
+        156627
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-10.xml">
+        200701-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-apps/wordpress
+    </td>
+    <td class="tableinfo">
+      WordPress: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159229">
+        159229
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-09.xml">
+        200701-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-ftp/oftpd
+    </td>
+    <td class="tableinfo">
+      oftpd: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159178">
+        159178
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-08.xml">
+        200701-08
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/opera
+    </td>
+    <td class="tableinfo">
+      Opera: Two remote code execution vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=160369">
+
+        160369
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-07.xml">
+        200701-07
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/openoffice-bin (and 1 <a href="http://security.gentoo.org/glsa/glsa-200701-07.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      OpenOffice.org: EMF/WMF file handling vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159951">
+        159951
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-06.xml">
+
+        200701-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/w3m
+    </td>
+    <td class="tableinfo">
+
+      w3m: Format string vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=159145">
+        159145
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-05.xml">
+        200701-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      kde-base/kdegraphics-kfile-plugins
+    </td>
+
+    <td class="tableinfo">
+      KDE kfile JPEG info plugin: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=155949">
+        155949
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-04.xml">
+        200701-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      www-client/seamonkey
+    </td>
+    <td class="tableinfo">
+      SeaMonkey: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=158576">
+        158576
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-03.xml">
+        200701-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      mail-client/mozilla-thunderbird (and 1 <a href="http://security.gentoo.org/glsa/glsa-200701-03.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Thunderbird: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=158571">
+        158571
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-02.xml">
+        200701-02
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 1 <a href="http://security.gentoo.org/glsa/glsa-200701-02.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=156023">
+        156023
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200701-01.xml">
+        200701-01
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-admin/denyhosts
+    </td>
+    <td class="tableinfo">
+      DenyHosts: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=157163">
+        157163
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-21.xml">
+
+        200612-21
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/ruby
+    </td>
+    <td class="tableinfo">
+
+      Ruby: Denial of Service vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=157048">
+        157048
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-20.xml">
+        200612-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/imlib2
+    </td>
+
+    <td class="tableinfo">
+      imlib2: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154216">
+        154216
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-19.xml">
+        200612-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+
+      sys-auth/pam_ldap
+    </td>
+    <td class="tableinfo">
+      pam_ldap: Authentication bypass vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153916">
+        153916
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-18.xml">
+        200612-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=157698">
+        157698
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-17.xml">
+        200612-17
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-dialup/gnuradius
+    </td>
+    <td class="tableinfo">
+      GNU Radius: Format string vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=156376">
+
+        156376
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-16.xml">
+        200612-16
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/links
+    </td>
+    <td class="tableinfo">
+      Links: Arbitrary Samba command execution
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=157028">
+        157028
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-15.xml">
+
+        200612-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-antivirus/vlnx
+    </td>
+    <td class="tableinfo">
+
+      McAfee VirusScan: Insecure DT_RPATH
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=156989">
+        156989
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-14.xml">
+        200612-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apps/trac
+    </td>
+
+    <td class="tableinfo">
+      Trac: Cross-site request forgery
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154574">
+        154574
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-13.xml">
+        200612-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      gnome-extra/libgsf
+    </td>
+    <td class="tableinfo">
+      libgsf: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=156693">
+        156693
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-12.xml">
+        200612-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      app-antivirus/f-prot
+    </td>
+    <td class="tableinfo">
+      F-PROT Antivirus: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=157612">
+        157612
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-11.xml">
+        200612-11
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      app-emulation/emul-linux-x86-baselibs
+    </td>
+    <td class="tableinfo">
+      AMD64 x86 emulation base libraries: OpenSSL multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=152640">
+
+        152640
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-10.xml">
+        200612-10
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-arch/tar
+    </td>
+    <td class="tableinfo">
+      Tar: Directory traversal vulnerability
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=155901">
+        155901
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-09.xml">
+
+        200612-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-wireless/madwifi-ng
+    </td>
+    <td class="tableinfo">
+
+      MadWifi: Kernel driver buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=157449">
+        157449
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-08.xml">
+        200612-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-client/seamonkey
+    </td>
+
+    <td class="tableinfo">
+      SeaMonkey: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154449">
+        154449
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-07.xml">
+        200612-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-client/mozilla-firefox (and 1 <a href="http://security.gentoo.org/glsa/glsa-200612-07.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154434">
+        154434
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-06.xml">
+        200612-06
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      mail-client/mozilla-thunderbird (and 1 <a href="http://security.gentoo.org/glsa/glsa-200612-06.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Thunderbird: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154448">
+        154448
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-05.xml">
+        200612-05
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/koffice-libs
+    </td>
+    <td class="tableinfo">
+      KOffice shared libraries: Heap corruption
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=155914">
+        155914
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-04.xml">
+
+        200612-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libmodplug
+    </td>
+    <td class="tableinfo">
+
+      ModPlug: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=143404">
+        143404
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-03.xml">
+        200612-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-crypt/gnupg
+    </td>
+
+    <td class="tableinfo">
+      GnuPG: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=156476">
+        156476
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-02.xml">
+        200612-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-libs/xine-lib
+    </td>
+    <td class="tableinfo">
+      xine-lib: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=156645">
+        156645
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200612-01.xml">
+        200612-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/wv
+    </td>
+    <td class="tableinfo">
+      wv library: Multiple integer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153800">
+        153800
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-26.xml">
+        200611-26
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-ftp/proftpd
+    </td>
+    <td class="tableinfo">
+      ProFTPD: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154650">
+
+        154650
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-25.xml">
+        200611-25
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-nds/openldap
+    </td>
+    <td class="tableinfo">
+      OpenLDAP: Denial of Service vulnerability
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154349">
+        154349
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-24.xml">
+
+        200611-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-arch/lha
+    </td>
+    <td class="tableinfo">
+
+      LHa: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=151252">
+        151252
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-23.xml">
+        200611-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/mono
+    </td>
+
+    <td class="tableinfo">
+      Mono: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=150264">
+        150264
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-22.xml">
+        200611-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-apps/horde-ingo
+    </td>
+    <td class="tableinfo">
+      Ingo H3: Folder name shell command injection
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153927">
+        153927
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-21.xml">
+        200611-21
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+
+    <td class="tableinfo">
+      app-editors/kile
+    </td>
+    <td class="tableinfo">
+      Kile: Incorrect backup file permission
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=155613">
+        155613
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-20.xml">
+        200611-20
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/gv
+    </td>
+    <td class="tableinfo">
+      GNU gv: Stack overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154573">
+
+        154573
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-19.xml">
+        200611-19
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/imagemagick
+    </td>
+    <td class="tableinfo">
+      ImageMagick: PALM and DCM buffer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=152672">
+        152672
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-18.xml">
+
+        200611-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-nntp/tin
+    </td>
+    <td class="tableinfo">
+
+      TIN: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=150229">
+        150229
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-17.xml">
+        200611-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      x11-wm/fvwm
+    </td>
+
+    <td class="tableinfo">
+      fvwm: fvwm-menu-directory fvwm command injection
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=155078">
+        155078
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-16.xml">
+        200611-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      sys-apps/texinfo
+    </td>
+    <td class="tableinfo">
+      Texinfo: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154316">
+        154316
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-15.xml">
+        200611-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      net-mail/qmailadmin
+    </td>
+    <td class="tableinfo">
+      qmailAdmin: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153896">
+        153896
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-14.xml">
+        200611-14
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      sys-cluster/torque
+    </td>
+    <td class="tableinfo">
+      TORQUE: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=152104">
+
+        152104
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-13.xml">
+        200611-13
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/avahi
+    </td>
+    <td class="tableinfo">
+      Avahi: "netlink" message vulnerability
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154322">
+        154322
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-12.xml">
+
+        200611-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/ruby
+    </td>
+    <td class="tableinfo">
+
+      Ruby: Denial of Service vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153497">
+        153497
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-11.xml">
+        200611-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apps/tikiwiki
+    </td>
+
+    <td class="tableinfo">
+      TikiWiki: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153820">
+        153820
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-10.xml">
+        200611-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-apps/wordpress
+    </td>
+    <td class="tableinfo">
+      WordPress: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=153303">
+        153303
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-09.xml">
+        200611-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/libpng
+    </td>
+    <td class="tableinfo">
+      libpng: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154380">
+        154380
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-08.xml">
+        200611-08
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-arch/rpm
+    </td>
+    <td class="tableinfo">
+      RPM: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=154218">
+
+        154218
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-07.xml">
+        200611-07
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/graphicsmagick
+    </td>
+    <td class="tableinfo">
+      GraphicsMagick: PALM and DCM buffer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=152668">
+        152668
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-06.xml">
+
+        200611-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/openssh
+    </td>
+    <td class="tableinfo">
+
+      OpenSSH: Multiple Denial of Service vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=149502">
+        149502
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-05.xml">
+        200611-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-ftp/netkit-ftpd
+    </td>
+
+    <td class="tableinfo">
+      Netkit FTP Server: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=150292">
+        150292
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-04.xml">
+        200611-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-apps/bugzilla
+    </td>
+    <td class="tableinfo">
+      Bugzilla: Multiple Vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=151563">
+        151563
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-03.xml">
+        200611-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      x11-drivers/nvidia-drivers
+    </td>
+    <td class="tableinfo">
+      NVIDIA binary graphics driver: Privilege escalation vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=151635">
+        151635
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-02.xml">
+        200611-02
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      x11-libs/qt
+    </td>
+    <td class="tableinfo">
+      Qt: Integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=151838">
+
+        151838
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200611-01.xml">
+        200611-01
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-misc/screen
+    </td>
+    <td class="tableinfo">
+      Screen: UTF-8 character handling vulnerability
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=152770">
+        152770
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-15.xml">
+
+        200610-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/asterisk
+    </td>
+    <td class="tableinfo">
+
+      Asterisk: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=144941">
+        144941
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-14.xml">
+        200610-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      dev-lang/php
+    </td>
+
+    <td class="tableinfo">
+      PHP: Integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=150261">
+        150261
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-13.xml">
+        200610-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-sound/cheesetracker
+    </td>
+    <td class="tableinfo">
+      Cheese Tracker: Buffer Overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142391">
+        142391
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-12.xml">
+        200610-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      www-apache/mod_tcl
+    </td>
+    <td class="tableinfo">
+      Apache mod_tcl: Format string vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=151359">
+        151359
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-11.xml">
+        200610-11
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      dev-libs/openssl
+    </td>
+    <td class="tableinfo">
+      OpenSSL: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=145510">
+
+        145510
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-10.xml">
+        200610-10
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple Vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=151561">
+        151561
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-09.xml">
+
+        200610-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/musicbrainz
+    </td>
+    <td class="tableinfo">
+
+      libmusicbrainz: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=144089">
+        144089
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-08.xml">
+        200610-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-util/cscope
+    </td>
+
+    <td class="tableinfo">
+      Cscope: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=144869">
+        144869
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-07.xml">
+        200610-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-lang/python
+    </td>
+    <td class="tableinfo">
+      Python: Buffer Overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=149065">
+        149065
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-06.xml">
+        200610-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-libs/nss
+    </td>
+    <td class="tableinfo">
+      Mozilla Network Security Service (NSS): RSA signature forgery
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=148283">
+        148283
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-05.xml">
+        200610-05
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/capi4hylafax
+    </td>
+    <td class="tableinfo">
+      CAPI4Hylafax fax receiver: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=145982">
+
+        145982
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-04.xml">
+        200610-04
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/seamonkey
+    </td>
+    <td class="tableinfo">
+      Seamonkey: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=147651">
+        147651
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-03.xml">
+
+        200610-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-arch/ncompress
+    </td>
+    <td class="tableinfo">
+
+      ncompress: Buffer Underflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=141728">
+        141728
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-02.xml">
+        200610-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-www/netscape-flash
+    </td>
+
+    <td class="tableinfo">
+      Adobe Flash Player: Arbitrary code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=147421">
+        147421
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200610-01.xml">
+        200610-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      mail-client/mozilla-thunderbird (and 1 <a href="http://security.gentoo.org/glsa/glsa-200610-01.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Thunderbird: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=147653">
+        147653
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-20.xml">
+        200609-20
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/dokuwiki
+    </td>
+    <td class="tableinfo">
+      DokuWiki: Shell command injection and Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=149266">
+
+        149266
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-19.xml">
+        200609-19
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 1 <a href="http://security.gentoo.org/glsa/glsa-200609-19.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=147652">
+        147652
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-18.xml">
+
+        200609-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/opera
+    </td>
+    <td class="tableinfo">
+
+      Opera: RSA signature forgery
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=147838">
+        147838
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-17.xml">
+        200609-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/openssh
+    </td>
+
+    <td class="tableinfo">
+      OpenSSH: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=148228">
+        148228
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-16.xml">
+        200609-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      www-apps/tikiwiki
+    </td>
+    <td class="tableinfo">
+      Tikiwiki: Arbitrary command execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=145714">
+        145714
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-15.xml">
+        200609-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-libs/gnutls
+    </td>
+    <td class="tableinfo">
+      GnuTLS: RSA Signature Forgery
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=147682">
+        147682
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-14.xml">
+        200609-14
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/imagemagick
+    </td>
+    <td class="tableinfo">
+      ImageMagick: Multiple Vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=144091">
+
+        144091
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-13.xml">
+        200609-13
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-arch/gzip
+    </td>
+    <td class="tableinfo">
+      gzip: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=145511">
+        145511
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-12.xml">
+
+        200609-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-mail/mailman
+    </td>
+    <td class="tableinfo">
+
+      Mailman: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=139976">
+        139976
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-11.xml">
+        200609-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-dns/bind
+    </td>
+
+    <td class="tableinfo">
+      BIND: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=146486">
+        146486
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-10.xml">
+        200609-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      www-apps/dokuwiki
+    </td>
+    <td class="tableinfo">
+      DokuWiki: Arbitrary command execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=146800">
+        146800
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-09.xml">
+        200609-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-video/ffmpeg
+    </td>
+    <td class="tableinfo">
+      FFmpeg: Buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=133520">
+        133520
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-08.xml">
+        200609-08
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/xine-lib
+    </td>
+    <td class="tableinfo">
+      xine-lib: Buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=133520">
+
+        133520
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-07.xml">
+        200609-07
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      x11-libs/libXfont (and 1 <a href="http://security.gentoo.org/glsa/glsa-200609-07.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      LibXfont, monolithic X.org: Multiple integer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=145513">
+        145513
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-06.xml">
+
+        200609-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/adplug
+    </td>
+    <td class="tableinfo">
+
+      AdPlug: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=139593">
+        139593
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-05.xml">
+        200609-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-libs/openssl (and 1 <a href="http://security.gentoo.org/glsa/glsa-200609-05.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=146375">
+        146375
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-04.xml">
+        200609-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      x11-libs/libXfont
+    </td>
+    <td class="tableinfo">
+      LibXfont: Multiple integer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=144092">
+        144092
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-03.xml">
+        200609-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      games-simulation/openttd
+    </td>
+    <td class="tableinfo">
+      OpenTTD: Remote Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=131010">
+        131010
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-02.xml">
+        200609-02
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      games-puzzle/gtetrinet
+    </td>
+    <td class="tableinfo">
+      GTetrinet: Remote code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=144867">
+
+        144867
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200609-01.xml">
+        200609-01
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/streamripper
+    </td>
+    <td class="tableinfo">
+      Streamripper: Multiple remote buffer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=144861">
+        144861
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-28.xml">
+
+        200608-28
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/php
+    </td>
+    <td class="tableinfo">
+
+      PHP: Arbitary code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=143126">
+        143126
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-27.xml">
+        200608-27
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-util/motor
+    </td>
+
+    <td class="tableinfo">
+      Motor: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135020">
+        135020
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-26.xml">
+        200608-26
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-analyzer/wireshark
+    </td>
+    <td class="tableinfo">
+      Wireshark: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=144946">
+        144946
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-25.xml">
+        200608-25
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      x11-apps/xdm (and 9 <a href="http://security.gentoo.org/glsa/glsa-200608-25.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      X.org and some X.org libraries: Local privilege escalations
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135974">
+        135974
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-24.xml">
+        200608-24
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/alsaplayer
+    </td>
+    <td class="tableinfo">
+      AlsaPlayer: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=143402">
+
+        143402
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-23.xml">
+        200608-23
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sys-cluster/heartbeat
+    </td>
+    <td class="tableinfo">
+      Heartbeat: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=141894">
+        141894
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-22.xml">
+
+        200608-22
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/fbida
+    </td>
+    <td class="tableinfo">
+
+      fbida: Arbitrary command execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=141684">
+        141684
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-21.xml">
+        200608-21
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-crypt/heimdal
+    </td>
+
+    <td class="tableinfo">
+      Heimdal: Multiple local privilege escalation vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=143371">
+        143371
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-20.xml">
+        200608-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      dev-ruby/rails
+    </td>
+    <td class="tableinfo">
+      Ruby on Rails: Several vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=143369">
+        143369
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-19.xml">
+        200608-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      www-apps/wordpress
+    </td>
+    <td class="tableinfo">
+      WordPress: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142142">
+        142142
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-18.xml">
+        200608-18
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-perl/net-server
+    </td>
+    <td class="tableinfo">
+      Net::Server: Format string vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142386">
+
+        142386
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-17.xml">
+        200608-17
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libwmf
+    </td>
+    <td class="tableinfo">
+      libwmf: Buffer overflow vulnerability
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=139325">
+        139325
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-16.xml">
+
+        200608-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      games-strategy/warzone2100
+    </td>
+    <td class="tableinfo">
+
+      Warzone 2100 Resurrection: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142389">
+        142389
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-15.xml">
+        200608-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-crypt/mit-krb5
+    </td>
+
+    <td class="tableinfo">
+      MIT Kerberos 5: Multiple local privilege escalation vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=143240">
+        143240
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-14.xml">
+        200608-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-libs/dumb
+    </td>
+    <td class="tableinfo">
+      DUMB: Heap buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142387">
+        142387
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-13.xml">
+        200608-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Heap buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=143093">
+        143093
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-12.xml">
+        200608-12
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      x11-misc/x11vnc
+    </td>
+    <td class="tableinfo">
+      x11vnc: Authentication bypass in included LibVNCServer code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142559">
+
+        142559
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-11.xml">
+        200608-11
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-admin/webmin (and 1 <a href="http://security.gentoo.org/glsa/glsa-200608-11.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Webmin, Usermin: File Disclosure
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=138552">
+        138552
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-10.xml">
+
+        200608-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/pike
+    </td>
+    <td class="tableinfo">
+
+      pike: SQL injection vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=136065">
+        136065
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-09.xml">
+        200608-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-db/mysql
+    </td>
+
+    <td class="tableinfo">
+      MySQL: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142429">
+        142429
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-08.xml">
+        200608-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      app-crypt/gnupg
+    </td>
+    <td class="tableinfo">
+      GnuPG: Integer overflow vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142248">
+        142248
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-07.xml">
+        200608-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/tiff
+    </td>
+    <td class="tableinfo">
+      libTIFF: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=142383">
+        142383
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-06.xml">
+        200608-06
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-mta/courier
+    </td>
+    <td class="tableinfo">
+      Courier MTA: Denial of Service vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135005">
+
+        135005
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-05.xml">
+        200608-05
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-libs/libvncserver
+    </td>
+    <td class="tableinfo">
+      LibVNCServer: Authentication bypass
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=136916">
+        136916
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-04.xml">
+
+        200608-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/mozilla-thunderbird (and 1 <a href="http://security.gentoo.org/glsa/glsa-200608-04.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Mozilla Thunderbird: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=141842">
+        141842
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-03.xml">
+        200608-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-client/mozilla-firefox (and 1 <a href="http://security.gentoo.org/glsa/glsa-200608-03.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=141842">
+        141842
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-02.xml">
+        200608-02
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/seamonkey
+    </td>
+    <td class="tableinfo">
+      Mozilla SeaMonkey: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=141842">
+
+        141842
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200608-01.xml">
+        200608-01
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-servers/apache
+    </td>
+    <td class="tableinfo">
+      Apache: Off-by-one flaw in mod_rewrite
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=141986">
+        141986
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-13.xml">
+
+        200607-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/audacious
+    </td>
+    <td class="tableinfo">
+
+      Audacious: Multiple heap and buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=139957">
+        139957
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-12.xml">
+        200607-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/openoffice (and 1 <a href="http://security.gentoo.org/glsa/glsa-200607-12.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      OpenOffice.org: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=138545">
+        138545
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-11.xml">
+        200607-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-libs/tunepimp
+    </td>
+    <td class="tableinfo">
+      TunePimp: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=140184">
+        140184
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-10.xml">
+        200607-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-fs/samba
+    </td>
+    <td class="tableinfo">
+      Samba: Denial of Service vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=139369">
+        139369
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-09.xml">
+        200607-09
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/wireshark (and 1 <a href="http://security.gentoo.org/glsa/glsa-200607-09.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Wireshark: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=140856">
+        140856
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-08.xml">
+        200607-08
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/gimp
+    </td>
+    <td class="tableinfo">
+      GIMP: Buffer overflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=139524">
+        139524
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-07.xml">
+
+        200607-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/xine-lib
+    </td>
+    <td class="tableinfo">
+
+      xine-lib: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=139319">
+        139319
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-06.xml">
+        200607-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libpng (and 1 <a href="http://security.gentoo.org/glsa/glsa-200607-06.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      libpng: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=138433">
+        138433
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-05.xml">
+        200607-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-sound/shoutcast-server-bin
+    </td>
+    <td class="tableinfo">
+      SHOUTcast server: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=136721">
+        136721
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-04.xml">
+        200607-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      dev-db/postgresql
+    </td>
+    <td class="tableinfo">
+      PostgreSQL: SQL injection
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=134168">
+        134168
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-03.xml">
+        200607-03
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/tiff
+    </td>
+    <td class="tableinfo">
+      libTIFF: Multiple buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135881">
+
+        135881
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-02.xml">
+        200607-02
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/freetype
+    </td>
+    <td class="tableinfo">
+      FreeType: Multiple integer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=124828">
+        124828
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200607-01.xml">
+
+        200607-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-sound/mpg123
+    </td>
+    <td class="tableinfo">
+
+      mpg123: Heap overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=133988">
+        133988
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-30.xml">
+        200606-30
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/kiax
+    </td>
+
+    <td class="tableinfo">
+      Kiax: Arbitrary code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=136099">
+        136099
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-29.xml">
+        200606-29
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-apps/tikiwiki
+    </td>
+    <td class="tableinfo">
+      Tikiwiki: SQL injection and multiple XSS vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=136723">
+        136723
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-28.xml">
+        200606-28
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+
+    <td class="tableinfo">
+      www-apps/horde
+    </td>
+    <td class="tableinfo">
+      Horde Web Application Framework: XSS vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=136830">
+        136830
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-27.xml">
+        200606-27
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/mutt
+    </td>
+    <td class="tableinfo">
+      Mutt: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=138125">
+
+        138125
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-26.xml">
+        200606-26
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-irc/emech
+    </td>
+    <td class="tableinfo">
+      EnergyMech: Denial of Service
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=132749">
+        132749
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-25.xml">
+
+        200606-25
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/hashcash
+    </td>
+    <td class="tableinfo">
+
+      Hashcash: Possible heap overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=134960">
+        134960
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-24.xml">
+        200606-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/wv2
+    </td>
+
+    <td class="tableinfo">
+      wv2: Integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=136759">
+        136759
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-23.xml">
+        200606-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      kde-base/kdebase (and 1 <a href="http://security.gentoo.org/glsa/glsa-200606-23.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      KDM: Symlink vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=136201">
+        136201
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-22.xml">
+        200606-22
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      kde-base/arts
+    </td>
+    <td class="tableinfo">
+      aRts: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135970">
+
+        135970
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-21.xml">
+        200606-21
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/mozilla-thunderbird (and 1 <a href="http://security.gentoo.org/glsa/glsa-200606-21.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Thunderbird: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135256">
+        135256
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-20.xml">
+
+        200606-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      games-misc/typespeed
+    </td>
+    <td class="tableinfo">
+
+      Typespeed: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135071">
+        135071
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-19.xml">
+        200606-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-mta/sendmail
+    </td>
+
+    <td class="tableinfo">
+      Sendmail: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135141">
+        135141
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-18.xml">
+        200606-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      sys-auth/pam_mysql
+    </td>
+    <td class="tableinfo">
+      PAM-MySQL: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=120842">
+        120842
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-17.xml">
+        200606-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      net-nsd/openldap
+    </td>
+    <td class="tableinfo">
+      OpenLDAP: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=134010">
+        134010
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-16.xml">
+        200606-16
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/dokuwiki
+    </td>
+    <td class="tableinfo">
+      DokuWiki: PHP code injection
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135623">
+
+        135623
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-15.xml">
+        200606-15
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/asterisk
+    </td>
+    <td class="tableinfo">
+      Asterisk: IAX2 video frame buffer overflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135680">
+        135680
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-14.xml">
+
+        200606-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      gnome-base/gdm
+    </td>
+    <td class="tableinfo">
+
+      GDM: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135027">
+        135027
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-13.xml">
+        200606-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-db/mysql
+    </td>
+
+    <td class="tableinfo">
+      MySQL: SQL Injection
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135076">
+        135076
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-12.xml">
+        200606-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-client/mozilla-firefox (and 1 <a href="http://security.gentoo.org/glsa/glsa-200606-12.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135254">
+        135254
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-11.xml">
+        200606-11
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/jpeg
+    </td>
+    <td class="tableinfo">
+      JPEG library: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=130889">
+
+        130889
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-10.xml">
+        200606-10
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-util/cscope
+    </td>
+    <td class="tableinfo">
+      Cscope: Many buffer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=133829">
+        133829
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-09.xml">
+
+        200606-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      mail-filter/spamassassin
+    </td>
+    <td class="tableinfo">
+
+      SpamAssassin: Execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=135746">
+        135746
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-08.xml">
+        200606-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      www-apps/wordpress
+    </td>
+
+    <td class="tableinfo">
+      WordPress: Arbitrary command execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=134397">
+        134397
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-07.xml">
+        200606-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      sys-process/vixie-cron
+    </td>
+    <td class="tableinfo">
+      Vixie Cron: Privilege Escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=134194">
+        134194
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-06.xml">
+        200606-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      net-www/awstats
+    </td>
+    <td class="tableinfo">
+      AWStats: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=130487">
+        130487
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-05.xml">
+        200606-05
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Low
+    </td>
+    <td class="tableinfo">
+      www-servers/pound
+    </td>
+    <td class="tableinfo">
+      Pound: HTTP request smuggling
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=118541">
+
+        118541
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-04.xml">
+        200606-04
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/tor
+    </td>
+    <td class="tableinfo">
+      Tor: Several vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=134329">
+        134329
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-03.xml">
+
+        200606-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/dia
+    </td>
+    <td class="tableinfo">
+
+      Dia: Format string vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=133699">
+        133699
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-02.xml">
+        200606-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sys-apps/shadow
+    </td>
+
+    <td class="tableinfo">
+      shadow: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=133615">
+        133615
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200606-01.xml">
+        200606-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-client/opera
+    </td>
+    <td class="tableinfo">
+      Opera: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=129800">
+        129800
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-17.xml">
+        200605-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      media-libs/tiff
+    </td>
+    <td class="tableinfo">
+      libTIFF: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=129675">
+        129675
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-16.xml">
+        200605-16
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Low
+    </td>
+    <td class="tableinfo">
+      dev-python/cherrypy
+    </td>
+    <td class="tableinfo">
+      CherryPy: Directory traversal vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=134273">
+
+        134273
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-15.xml">
+        200605-15
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/quagga
+    </td>
+    <td class="tableinfo">
+      Quagga Routing Suite: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=132353">
+        132353
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-14.xml">
+
+        200605-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/libextractor
+    </td>
+    <td class="tableinfo">
+
+      libextractor: Two heap-based buffer overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=133570">
+        133570
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-13.xml">
+        200605-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      dev-db/mysql
+    </td>
+
+    <td class="tableinfo">
+      MySQL: Information leakage
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=132146">
+        132146
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-12.xml">
+        200605-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      games-fps/quake3-bin (and 2 <a href="http://security.gentoo.org/glsa/glsa-200605-12.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Quake 3 engine based games: Buffer Overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=132377">
+        132377
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-11.xml">
+        200605-11
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/ruby
+    </td>
+    <td class="tableinfo">
+      Ruby: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=130657">
+
+        130657
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-10.xml">
+        200605-10
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-dns/pdnsd
+    </td>
+    <td class="tableinfo">
+      pdnsd: Denial of Service and potential arbitrary code execution
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=131341">
+        131341
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-09.xml">
+
+        200605-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      mail-client/mozilla-thunderbird (and 1 <a href="http://security.gentoo.org/glsa/glsa-200605-09.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Mozilla Thunderbird: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=130888">
+        130888
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-08.xml">
+        200605-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      dev-lang/php (and 1 <a href="http://security.gentoo.org/glsa/glsa-200605-08.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      PHP: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=127939">
+        127939
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-07.xml">
+        200605-07
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/nagios-core
+    </td>
+    <td class="tableinfo">
+      Nagios: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=132159">
+
+        132159
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-06.xml">
+        200605-06
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 1 <a href="http://security.gentoo.org/glsa/glsa-200605-06.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox: Potential remote code execution
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=131138">
+        131138
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-05.xml">
+
+        200605-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/rsync
+    </td>
+    <td class="tableinfo">
+
+      rsync: Potential integer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=131631">
+        131631
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-04.xml">
+        200605-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-apps/phpwebsite
+    </td>
+
+    <td class="tableinfo">
+      phpWebSite: Local file inclusion
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=130295">
+        130295
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-03.xml">
+        200605-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Buffer overflow in Freshclam
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=131791">
+        131791
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-02.xml">
+        200605-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      x11-base/xorg-x11
+    </td>
+    <td class="tableinfo">
+      X.Org: Buffer overflow in XRender extension
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=130979">
+        130979
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200605-01.xml">
+        200605-01
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/mplayer (and 1 <a href="http://security.gentoo.org/glsa/glsa-200605-01.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      MPlayer: Heap-based buffer overflow
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=127969">
+        127969
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-18.xml">
+        200604-18
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/mozilla (and 1 <a href="http://security.gentoo.org/glsa/glsa-200604-18.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Suite: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=130887">
+        130887
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-17.xml">
+
+        200604-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/ethereal
+    </td>
+    <td class="tableinfo">
+
+      Ethereal: Multiple vulnerabilities in protocol dissectors
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=130505">
+        130505
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-16.xml">
+        200604-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/xine-lib
+    </td>
+
+    <td class="tableinfo">
+      xine-lib: Buffer overflow vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=128838">
+        128838
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-15.xml">
+        200604-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-video/xine-ui
+    </td>
+    <td class="tableinfo">
+      xine-ui: Format string vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=130801">
+        130801
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-14.xml">
+        200604-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-office/dia
+    </td>
+    <td class="tableinfo">
+      Dia: Arbitrary code execution through XFig import
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=128107">
+        128107
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-13.xml">
+        200604-13
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/fbida
+    </td>
+    <td class="tableinfo">
+      fbida: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=129470">
+
+        129470
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-12.xml">
+        200604-12
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-client/mozilla-firefox (and 1 <a href="http://security.gentoo.org/glsa/glsa-200604-12.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Mozilla Firefox: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=129924">
+        129924
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-11.xml">
+
+        200604-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      games-server/crossfire-server
+    </td>
+    <td class="tableinfo">
+
+      Crossfire server: Denial of Service and potential arbitrary code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=126169">
+        126169
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-10.xml">
+        200604-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/xzgv (and 1 <a href="http://security.gentoo.org/glsa/glsa-200604-10.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      zgv, xzgv: Heap overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=127008">
+        127008
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-09.xml">
+        200604-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-libs/cyrus-sasl
+    </td>
+    <td class="tableinfo">
+      Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=129523">
+        129523
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-08.xml">
+        200604-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      www-apache/libapreq2
+    </td>
+    <td class="tableinfo">
+      libapreq2: Denial of Service vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=128610">
+        128610
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-07.xml">
+        200604-07
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-analyzer/cacti
+    </td>
+    <td class="tableinfo">
+      Cacti: Multiple vulnerabilities in included ADOdb
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=129284">
+
+        129284
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-06.xml">
+        200604-06
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+      ClamAV: Multiple vulnerabilities
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=128963">
+        128963
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-05.xml">
+
+        200604-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      games-fps/doomsday
+    </td>
+    <td class="tableinfo">
+
+      Doomsday: Format string vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=128690">
+        128690
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-04.xml">
+        200604-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/kaffeine
+    </td>
+
+    <td class="tableinfo">
+      Kaffeine: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=127326">
+        127326
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-03.xml">
+        200604-03
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-dialup/freeradius
+    </td>
+    <td class="tableinfo">
+      FreeRADIUS: Authentication bypass in EAP-MSCHAPv2 module
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=127229">
+        127229
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-02.xml">
+        200604-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      www-apps/horde
+    </td>
+    <td class="tableinfo">
+      Horde Application Framework: Remote code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=127889">
+        127889
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200604-01.xml">
+        200604-01
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apps/mediawiki
+    </td>
+    <td class="tableinfo">
+      MediaWiki: Cross-site scripting vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=127971">
+
+        127971
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-26.xml">
+        200603-26
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      games-misc/bsd-games
+    </td>
+    <td class="tableinfo">
+      bsd-games: Local privilege escalation in tetris-bsd
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=122399">
+        122399
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-25.xml">
+
+        200603-25
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-office/openoffice-bin (and 1 <a href="http://security.gentoo.org/glsa/glsa-200603-25.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      OpenOffice.org: Heap overflow in included libcurl
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=126433">
+        126433
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-24.xml">
+        200603-24
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-video/realplayer
+    </td>
+    <td class="tableinfo">
+      RealPlayer: Buffer overflow vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=127352">
+        127352
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-23.xml">
+        200603-23
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      games-roguelike/nethack (and 2 <a href="http://security.gentoo.org/glsa/glsa-200603-23.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      NetHack, Slash'EM, Falcon's Eye: Local privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=125902">
+        125902
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-22.xml">
+        200603-22
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-lang/php
+    </td>
+    <td class="tableinfo">
+      PHP: Format string and XSS vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=125878">
+
+        125878
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-21.xml">
+        200603-21
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      mail-mta/sendmail
+    </td>
+    <td class="tableinfo">
+      Sendmail: Race condition in the handling of asynchronous signals
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=125623">
+        125623
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-20.xml">
+
+        200603-20
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-www/netscape-flash
+    </td>
+    <td class="tableinfo">
+
+      Macromedia Flash Player: Arbitrary code execution
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=102777">
+        102777
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-19.xml">
+        200603-19
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-misc/curl
+    </td>
+
+    <td class="tableinfo">
+      cURL/libcurl: Buffer overflow in the handling of TFTP URLs
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=125766">
+        125766
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-18.xml">
+        200603-18
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      media-gfx/pngcrush
+    </td>
+    <td class="tableinfo">
+      Pngcrush: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=123286">
+        123286
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-17.xml">
+        200603-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      media-sound/peercast
+    </td>
+    <td class="tableinfo">
+      PeerCast: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=123432">
+        123432
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-16.xml">
+        200603-16
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-mail/metamail
+    </td>
+    <td class="tableinfo">
+      Metamail: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=126052">
+
+        126052
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-15.xml">
+        200603-15
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      dev-perl/crypt-cbc
+    </td>
+    <td class="tableinfo">
+      Crypt::CBC: Insecure initialization vector
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=126048">
+        126048
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-14.xml">
+
+        200603-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-crypt/heimdal
+    </td>
+    <td class="tableinfo">
+
+      Heimdal: rshd privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=121839">
+        121839
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-13.xml">
+        200603-13
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-php/PEAR-Auth
+    </td>
+
+    <td class="tableinfo">
+      PEAR-Auth: Potential authentication bypass
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=123832">
+        123832
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-12.xml">
+        200603-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-arch/zoo
+    </td>
+    <td class="tableinfo">
+      zoo: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=125622">
+        125622
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-11.xml">
+        200603-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      games-strategy/freeciv
+    </td>
+    <td class="tableinfo">
+      Freeciv: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=125304">
+        125304
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-10.xml">
+        200603-10
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      games-fps/cube
+    </td>
+    <td class="tableinfo">
+      Cube: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=125289">
+
+        125289
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-09.xml">
+        200603-09
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      mail-client/squirrelmail
+    </td>
+    <td class="tableinfo">
+      SquirrelMail: Cross-site scripting and IMAP command injection
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=123781">
+        123781
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-08.xml">
+
+        200603-08
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-crypt/gnupg
+    </td>
+    <td class="tableinfo">
+
+      GnuPG: Incorrect signature verification
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=125217">
+        125217
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-07.xml">
+        200603-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      sys-devel/flex
+    </td>
+
+    <td class="tableinfo">
+      flex: Potential insecure code generation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=122940">
+        122940
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-06.xml">
+        200603-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-arch/tar
+    </td>
+    <td class="tableinfo">
+      GNU tar: Buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=123038">
+        123038
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-05.xml">
+        200603-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-arch/zoo
+    </td>
+    <td class="tableinfo">
+      zoo: Stack-based buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=123782">
+        123782
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-04.xml">
+        200603-04
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      net-mail/up-imapproxy
+    </td>
+    <td class="tableinfo">
+      IMAP Proxy: Format string vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=107679">
+
+        107679
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-03.xml">
+        200603-03
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-video/mplayer
+    </td>
+    <td class="tableinfo">
+      MPlayer: Multiple integer overflows
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=115760">
+        115760
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-02.xml">
+
+        200603-02
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/tetex (and 2 <a href="http://security.gentoo.org/glsa/glsa-200603-02.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      teTeX, pTeX, CSTeX: Multiple overflows in included XPdf code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=115775">
+        115775
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200603-01.xml">
+        200603-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      www-apps/wordpress
+    </td>
+    <td class="tableinfo">
+      WordPress: SQL injection vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=121661">
+        121661
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-14.xml">
+        200602-14
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+
+    <td class="tableinfo">
+      app-text/noweb
+    </td>
+    <td class="tableinfo">
+      noweb: Insecure temporary file creation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=122705">
+        122705
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-13.xml">
+        200602-13
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/graphicsmagick
+    </td>
+    <td class="tableinfo">
+      GraphicsMagick: Format string vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=119476">
+
+        119476
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-12.xml">
+        200602-12
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/gpdf
+    </td>
+    <td class="tableinfo">
+      GPdf: heap overflows in included Xpdf code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=121511">
+        121511
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-11.xml">
+
+        200602-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      net-misc/openssh (and 1 <a href="http://security.gentoo.org/glsa/glsa-200602-11.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      OpenSSH, Dropbear: Insecure use of system() call
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=119232">
+        119232
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-10.xml">
+        200602-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-crypt/gnupg
+    </td>
+    <td class="tableinfo">
+      GnuPG: Incorrect signature verification
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=122721">
+        122721
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-09.xml">
+        200602-09
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      games-action/bomberclone
+    </td>
+    <td class="tableinfo">
+      BomberClone: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=121605">
+        121605
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-08.xml">
+        200602-08
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      dev-libs/libtasn1 (and 1 <a href="http://security.gentoo.org/glsa/glsa-200602-08.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      libtasn1, GNU TLS: Security flaw in DER decoding
+    </td>
+    <td class="tableinfo">
+
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=122307">
+        122307
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-07.xml">
+        200602-07
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-java/sun-jdk (and 1 <a href="http://security.gentoo.org/glsa/glsa-200602-07.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Sun JDK/JRE: Applet privilege escalation
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=122156">
+        122156
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-06.xml">
+
+        200602-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/imagemagick
+    </td>
+    <td class="tableinfo">
+
+      ImageMagick: Format string vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=83542">
+        83542
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-05.xml">
+        200602-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      kde-base/kdegraphics (and 1 <a href="http://security.gentoo.org/glsa/glsa-200602-05.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      KPdf: Heap based overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=121375">
+        121375
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-04.xml">
+        200602-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      app-text/xpdf (and 1 <a href="http://security.gentoo.org/glsa/glsa-200602-04.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Xpdf, Poppler: Heap overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=120985">
+        120985
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-03.xml">
+        200602-03
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      www-servers/apache
+    </td>
+    <td class="tableinfo">
+      Apache: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=115324">
+
+        115324
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-02.xml">
+        200602-02
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      dev-php/adodb
+    </td>
+    <td class="tableinfo">
+      ADOdb: PostgresSQL command injection
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=120215">
+        120215
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200602-01.xml">
+
+        200602-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-plugins/gst-plugins-ffmpeg
+    </td>
+    <td class="tableinfo">
+
+      GStreamer FFmpeg plugin: Heap-based buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=119512">
+        119512
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-17.xml">
+        200601-17
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-text/xpdf (and 4 <a href="http://security.gentoo.org/glsa/glsa-200601-17.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=117481">
+        117481
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-16.xml">
+        200601-16
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      net-dns/mydns
+    </td>
+    <td class="tableinfo">
+      MyDNS: Denial of Service
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=119548">
+        119548
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-15.xml">
+        200601-15
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      net-proxy/paros
+    </td>
+    <td class="tableinfo">
+      Paros: Default administrator password
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=120352">
+        120352
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-14.xml">
+        200601-14
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      x11-libs/libast
+    </td>
+    <td class="tableinfo">
+      LibAST: Privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=120106">
+
+        120106
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-13.xml">
+        200601-13
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apps/gallery
+    </td>
+    <td class="tableinfo">
+      Gallery: Cross-site scripting vulnerability
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=119590">
+        119590
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-12.xml">
+
+        200601-12
+      </a>
+    </td>
+    <td class="tableinfo">
+      Low
+    </td>
+    <td class="tableinfo">
+      www-apps/trac
+    </td>
+    <td class="tableinfo">
+
+      Trac: Cross-site scripting vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=118302">
+        118302
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-11.xml">
+        200601-11
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      kde-base/kdelibs
+    </td>
+
+    <td class="tableinfo">
+      KDE kjs: URI heap overflow vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=118550">
+        118550
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-10.xml">
+        200601-10
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+
+      dev-java/sun-jdk (and 3 <a href="http://security.gentoo.org/glsa/glsa-200601-10.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      Sun and Blackdown Java: Applet privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=118114">
+        118114
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-09.xml">
+        200601-09
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-emulation/wine
+    </td>
+    <td class="tableinfo">
+      Wine: Windows Metafile SETABORTPROC vulnerability
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=118101">
+
+        118101
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-08.xml">
+        200601-08
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-gfx/blender
+    </td>
+    <td class="tableinfo">
+      Blender: Heap-based buffer overflow
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=118163">
+        118163
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-07.xml">
+
+        200601-07
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+      app-antivirus/clamav
+    </td>
+    <td class="tableinfo">
+
+      ClamAV: Remote execution of arbitrary code
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=118459">
+        118459
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-06.xml">
+        200601-06
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      media-libs/xine-lib (and 1 <a href="http://security.gentoo.org/glsa/glsa-200601-06.xml">more</a>)
+    </td>
+
+    <td class="tableinfo">
+      xine-lib, FFmpeg: Heap-based buffer overflow
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=115849">
+        115849
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-05.xml">
+        200601-05
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+    <td class="tableinfo">
+
+      www-apache/mod_auth_pgsql
+    </td>
+    <td class="tableinfo">
+      mod_auth_pgsql: Multiple format string vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=118096">
+        118096
+      </a>
+    </td>
+
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-04.xml">
+        200601-04
+      </a>
+    </td>
+    <td class="tableinfo">
+      High
+    </td>
+
+    <td class="tableinfo">
+      app-emulation/vmware-workstation
+    </td>
+    <td class="tableinfo">
+      VMware Workstation: Vulnerability in NAT networking
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=116238">
+        116238
+      </a>
+
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-03.xml">
+        200601-03
+      </a>
+    </td>
+    <td class="tableinfo">
+
+      High
+    </td>
+    <td class="tableinfo">
+      net-misc/hylafax
+    </td>
+    <td class="tableinfo">
+      HylaFAX: Multiple vulnerabilities
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=116389">
+
+        116389
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-02.xml">
+        200601-02
+      </a>
+
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      kde-base/kdegraphics (and 3 <a href="http://security.gentoo.org/glsa/glsa-200601-02.xml">more</a>)
+    </td>
+    <td class="tableinfo">
+      KPdf, KWord: Multiple overflows in included Xpdf code
+    </td>
+
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=114429">
+        114429
+      </a>
+    </td>
+  </tr>
+
+  <tr>
+    <td class="tableinfo">
+      <a href="http://security.gentoo.org/glsa/glsa-200601-01.xml">
+
+        200601-01
+      </a>
+    </td>
+    <td class="tableinfo">
+      Normal
+    </td>
+    <td class="tableinfo">
+      app-crypt/pinentry
+    </td>
+    <td class="tableinfo">
+
+      pinentry: Local privilege escalation
+    </td>
+    <td class="tableinfo">
+      <a href="http://bugs.gentoo.org/show_bug.cgi?id=116822">
+        116822
+      </a>
+    </td>
+  </tr>
+
+</table>
+<br><p class="copyright">
+    The contents of this document are licensed under the <a href="http://creativecommons.org/licenses/by-sa/2.5">Creative Commons -
+    Attribution / Share Alike</a> license.
+  </p>
+<!--
+  <rdf:RDF xmlns="http://web.resource.org/cc/"
+      xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
+  <License rdf:about="http://creativecommons.org/licenses/by-sa/2.5/">
+     <permits rdf:resource="http://web.resource.org/cc/Reproduction" />
+     <permits rdf:resource="http://web.resource.org/cc/Distribution" />
+     <requires rdf:resource="http://web.resource.org/cc/Notice" />
+     <requires rdf:resource="http://web.resource.org/cc/Attribution" />
+     <permits rdf:resource="http://web.resource.org/cc/DerivativeWorks" />
+     <requires rdf:resource="http://web.resource.org/cc/ShareAlike" />
+  </License>
+  </rdf:RDF>
+--><br>
+</td>
+
+<td width="1%" bgcolor="#dddaec" valign="top"><table border="0" cellspacing="4px" cellpadding="4px">
+<tr><td class="topsep" align="center"><p class="altmenu"><a title="View a printer-friendly version" class="altlink" href="/security/en/glsa/index.xml?style=printable">Print</a></p></td></tr>
+<tr><td class="topsep" align="center"><p class="alttext">Updated every 60 minutes</p></td></tr>
+<tr><td class="topsep" align="left"><p class="alttext"><b>Summary: </b>
+This index is automatically generated from XML source. Please contact the
+Gentoo Linux Security Team (security at gentoo.org) for related inquiries.
+</p></td></tr>
+<tr><td align="left" class="topsep"><p class="alttext">
+  <a href="mailto:security at gentoo.org" class="altlink"><b>Security Team</b></a>
+<br><i>Author</i><br></p></td></tr>
+<tr lang="en"><td align="center" class="topsep">
+<p class="alttext"><b>Donate</b> to support our development efforts.
+        </p>
+
+<form action="https://www.paypal.com/cgi-bin/webscr" method="post">
+<input type="hidden" name="cmd" value="_xclick"><input type="hidden" name="business" value="paypal at gentoo.org"><input type="hidden" name="item_name" value="Gentoo Linux Support"><input type="hidden" name="item_number" value="1000"><input type="hidden" name="image_url" value="/images/paypal.png"><input type="hidden" name="no_shipping" value="1"><input type="hidden" name="return" value="http://www.gentoo.org"><input type="hidden" name="cancel_return" value="http://www.gentoo.org"><input type="image" src="http://images.paypal.com/images/x-click-but21.gif" name="submit" alt="Donate to Gentoo">
+</form>
+</td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://osuosl.org/contribute"><img src="../../../images/osuosl.png" width="125" height="50" alt="Support OSL" title="Support OSL" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.vr.org"><img src="../../../images/vr-ad.png" width="125" height="144" alt="Gentoo Centric Hosting: vr.org" title="Gentoo Centric Hosting: vr.org" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.tek.net" target="_top"><img src="../../../images/tek-gentoo.gif" width="125" height="125" alt="Tek Alchemy" title="Tek Alchemy" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.sevenl.net" target="_top"><img src="../../../images/sponsors/sevenl_ad.png" width="125" height="144" alt="SevenL.net" title="SevenL.net" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.gni.com" target="_top"><img src="../../../images/gni_logo.png" width="125" alt="Global Netoptex Inc." title="Global Netoptex Inc." border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.bytemark.co.uk/r/gentoo-home" target="_top"><img src="../../../images/sponsors/bytemark_ad.png" width="125" alt="Bytemark" title="Bytemark" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.online-kredit-index.de/" target="_top"><img src="../../../images/sponsors/kredit-ad.jpg" width="125" alt="Online Kredit Index" title="Online Kredit Index" border="0"></a></td></tr>
+<tr><td align="center" class="topsep"></td></tr>
+</table></td>
+</tr></table></td></tr>
+<tr><td colspan="2" align="right" class="infohead">
+Copyright 2001-2009 Gentoo Foundation, Inc. Questions, Comments? <a class="highlight" href="/main/en/contact.xml">Contact us</a>.
+
+</td></tr>
+</table></body>
+</html>
+

Added: trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200703-23.html
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200703-23.html	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200703-23.html	2009-05-20 14:24:39 UTC (rev 3452)
@@ -0,0 +1,205 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
+<html lang="en">
+<head>
+<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+<link title="new" rel="stylesheet" href="../../../css/main.css" type="text/css">
+<link REL="shortcut icon" HREF="../../../favicon.ico" TYPE="image/x-icon">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/www-gentoo-org.xml" title="Gentoo Website">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/forums-gentoo-org.xml" title="Gentoo Forums">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/bugs-gentoo-org.xml" title="Gentoo Bugzilla">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/packages-gentoo-org.xml" title="Gentoo Packages">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/archives-gentoo-org.xml" title="Gentoo List Archives">
+<title>Gentoo Linux Documentation
+--
+  WordPress: Multiple vulnerabilities</title>
+</head>
+<body style="margin:0px;" bgcolor="#ffffff"><table width="100%" border="0" cellspacing="0" cellpadding="0">
+<tr><td valign="top" height="125" bgcolor="#45347b"><a href="/"><img border="0" src="../../../images/gtop-www.jpg" alt="Gentoo Logo"></a></td></tr>
+<tr><td valign="top" align="right" colspan="1" bgcolor="#ffffff"><table border="0" cellspacing="0" cellpadding="0" width="100%"><tr>
+
+<td width="99%" class="content" valign="top" align="left">
+<br><h1>WordPress: Multiple vulnerabilities</h1>
+<form name="contents" action="http://www.gentoo.org">
+<b>Content</b>:
+        <select name="url" size="1" OnChange="location.href=form.url.options[form.url.selectedIndex].value" style="font-family:sans-serif,Arial,Helvetica"><option value="#doc_chap1">1. Gentoo Linux Security Advisory</option>
+<option value="#doc_chap2">2. Impact Information</option>
+<option value="#doc_chap3">3. Resolution Information</option>
+<option value="#doc_chap4">4. References</option></select>
+</form>
+<p class="chaphead"><a name="doc_chap1"></a><span class="chapnum">1. 
+            </span>Gentoo Linux Security Advisory</p>
+
+<p class="secthead"><a name="doc_chap1_sect1">Version Information</a></p>
+<table class="ntable">
+          <tr>
+            <td class="infohead"><b>Advisory Reference</b></td>
+            <td class="tableinfo">GLSA 200703-23 / wordpress</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Release Date</b></td>
+
+            <td class="tableinfo">March 20, 2007</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Latest Revision</b></td>
+            <td class="tableinfo">March 20, 2007: 01</td>
+          </tr>
+          <tr>
+
+            <td class="infohead"><b>Impact</b></td>
+            <td class="tableinfo">low</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Exploitable</b></td>
+            <td class="tableinfo">remote</td>
+          </tr>
+
+        </table>
+<table class="ntable">
+          <tr>
+            <td class="infohead"><b>Package</b></td>
+            <td class="infohead"><b>Vulnerable versions</b></td>
+            <td class="infohead"><b>Unaffected versions</b></td>
+            <td class="infohead"><b>Architecture(s)</b></td>
+
+          </tr>
+          <tr>
+            <td class="tableinfo">www-apps/wordpress</td>
+            <td class="tableinfo">
+              &lt;=
+            2.1.2</td>
+            <td class="tableinfo"></td>
+            <td class="tableinfo">
+            x86 ppc hppa
+          </td>
+
+          </tr>
+        </table>
+<p>
+Related bugreports: 
+<a href="http://bugs.gentoo.org/show_bug.cgi?id=168529">#168529</a></p>
+<p class="secthead"><a name="doc_chap1_sect2">Synopsis</a></p>
+<p>
+    Wordpress contains several cross-site scripting, cross-site request forgery
+    and information leak vulnerabilities.
+  </p>
+<p class="chaphead"><a name="doc_chap2"></a><span class="chapnum">2. 
+            </span>Impact Information</p>
+
+<p class="secthead"><a name="doc_chap2_sect1">Background</a></p>
+<p>
+    WordPress is a popular personal publishing platform with a web
+    interface.
+    </p>
+<p class="secthead"><a name="doc_chap2_sect2">Description</a></p>
+<p>
+    WordPress contains cross-site scripting or cross-site scripting forgery
+    vulnerabilities reported by:
+    </p>
+<ul>
+<li>g30rg3_x in the "year"
+    parameter of the wp_title() function</li>
+<li>Alexander Concha in the
+    "demo" parameter of wp-admin/admin.php</li>
+
+<li>Samenspender and Stefan
+    Friedli in the "post" parameter of wp-admin/post.php and
+    wp-admin/page.php, in the "cat_ID" parameter of wp-admin/categories.php
+    and in the "c" parameter of wp-admin/comment.php</li>
+<li>PsychoGun in
+    the "file" parameter of wp-admin/templates.php</li>
+</ul>
+<p>
+    </p>
+<p>
+    Additionally, WordPress prints the full PHP script paths in some error
+    messages.
+    </p>
+<p class="secthead"><a name="doc_chap2_sect3">Impact</a></p>
+<p>
+    The cross-site scripting vulnerabilities can be triggered to steal
+    browser session data or cookies. A remote attacker can entice a user to
+    browse to a specially crafted web page that can trigger the cross-site
+    request forgery vulnerability and perform arbitrary WordPress actions
+    with the permissions of the user. Additionally, the path disclosure
+    vulnerability could help an attacker to perform other attacks.
+    </p>
+
+<p class="chaphead"><a name="doc_chap3"></a><span class="chapnum">3. 
+            </span>Resolution Information</p>
+<p class="secthead"><a name="doc_chap3_sect1">Workaround</a></p>
+<p>
+    There is no known workaround at this time for all these
+    vulnerabilities.
+    </p>
+<p class="secthead"><a name="doc_chap3_sect2">Resolution</a></p>
+<p>
+    Due to the numerous recently discovered vulnerabilities in WordPress,
+    this package has been masked in the portage tree. All WordPress users
+    are advised to unmerge it.
+    </p>
+<a name="doc_chap3_pre1"></a><table class="ntable" width="100%" cellspacing="0" cellpadding="0" border="0">
+<tr><td bgcolor="#7a5ada"><p class="codetitle">Code Listing 3.1: Resolution</p></td></tr>
+
+<tr><td bgcolor="#eeeeff" align="left" dir="ltr"><pre>
+# emerge --unmerge "www-apps/wordpress"
+</pre></td></tr>
+</table>
+<p class="chaphead"><a name="doc_chap4"></a><span class="chapnum">4. 
+            </span>References</p>
+<ul>
+          <li>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1049">CVE-2007-1049</a>
+          </li>
+          <li>
+
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1230">CVE-2007-1230</a>
+          </li>
+          <li>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1244">CVE-2007-1244</a>
+          </li>
+          <li>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409">CVE-2007-1409</a>
+
+          </li>
+          <li>
+            <a href="http://secunia.com/advisories/24430/">SA 24430</a>
+          </li>
+        </ul>
+<br><br>
+</td>
+<td width="1%" bgcolor="#dddaec" valign="top"><table border="0" cellspacing="4px" cellpadding="4px">
+<tr><td class="topsep" align="center"><p class="altmenu"><a title="View a printer-friendly version" class="altlink" href="/security/en/glsa/glsa-200703-23.xml?style=printable">Print</a></p></td></tr>
+<tr><td class="topsep" align="center"><p class="alttext">Updated March 20, 2007</p></td></tr>
+
+<tr><td class="topsep" align="left"><p class="alttext"><b>Summary: </b>
+This is a Gentoo Linux Security Advisory
+</p></td></tr>
+<tr><td align="left" class="topsep"><p class="alttext">
+    <a href="mailto:security at gentoo.org" class="altlink"><b>Security Team</b></a>
+  <br><i>Contact Address</i><br></p></td></tr>
+<tr lang="en"><td align="center" class="topsep">
+<p class="alttext"><b>Donate</b> to support our development efforts.
+        </p>
+<form action="https://www.paypal.com/cgi-bin/webscr" method="post">
+
+<input type="hidden" name="cmd" value="_xclick"><input type="hidden" name="business" value="paypal at gentoo.org"><input type="hidden" name="item_name" value="Gentoo Linux Support"><input type="hidden" name="item_number" value="1000"><input type="hidden" name="image_url" value="/images/paypal.png"><input type="hidden" name="no_shipping" value="1"><input type="hidden" name="return" value="http://www.gentoo.org"><input type="hidden" name="cancel_return" value="http://www.gentoo.org"><input type="image" src="http://images.paypal.com/images/x-click-but21.gif" name="submit" alt="Donate to Gentoo">
+</form>
+</td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://osuosl.org/contribute"><img src="../../../images/osuosl.png" width="125" height="50" alt="Support OSL" title="Support OSL" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.vr.org"><img src="../../../images/vr-ad.png" width="125" height="144" alt="Gentoo Centric Hosting: vr.org" title="Gentoo Centric Hosting: vr.org" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.tek.net" target="_top"><img src="../../../images/tek-gentoo.gif" width="125" height="125" alt="Tek Alchemy" title="Tek Alchemy" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.sevenl.net" target="_top"><img src="../../../images/sponsors/sevenl_ad.png" width="125" height="144" alt="SevenL.net" title="SevenL.net" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.gni.com" target="_top"><img src="../../../images/gni_logo.png" width="125" alt="Global Netoptex Inc." title="Global Netoptex Inc." border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.bytemark.co.uk/r/gentoo-home" target="_top"><img src="../../../images/sponsors/bytemark_ad.png" width="125" alt="Bytemark" title="Bytemark" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.online-kredit-index.de/" target="_top"><img src="../../../images/sponsors/kredit-ad.jpg" width="125" alt="Online Kredit Index" title="Online Kredit Index" border="0"></a></td></tr>
+<tr><td align="center" class="topsep"></td></tr>
+</table></td>
+</tr></table></td></tr>
+<tr><td colspan="2" align="right" class="infohead">
+Copyright 2001-2009 Gentoo Foundation, Inc. Questions, Comments? <a class="highlight" href="/main/en/contact.xml">Contact us</a>.
+
+</td></tr>
+</table></body>
+</html>
+

Added: trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200704-13.html
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200704-13.html	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200704-13.html	2009-05-20 14:24:39 UTC (rev 3452)
@@ -0,0 +1,169 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
+<html lang="en">
+<head>
+<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+<link title="new" rel="stylesheet" href="../../../css/main.css" type="text/css">
+<link REL="shortcut icon" HREF="../../../favicon.ico" TYPE="image/x-icon">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/www-gentoo-org.xml" title="Gentoo Website">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/forums-gentoo-org.xml" title="Gentoo Forums">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/bugs-gentoo-org.xml" title="Gentoo Bugzilla">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/packages-gentoo-org.xml" title="Gentoo Packages">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/archives-gentoo-org.xml" title="Gentoo List Archives">
+<title>Gentoo Linux Documentation
+--
+  File: Denial of Service</title>
+</head>
+<body style="margin:0px;" bgcolor="#ffffff"><table width="100%" border="0" cellspacing="0" cellpadding="0">
+<tr><td valign="top" height="125" bgcolor="#45347b"><a href="/"><img border="0" src="../../../images/gtop-www.jpg" alt="Gentoo Logo"></a></td></tr>
+<tr><td valign="top" align="right" colspan="1" bgcolor="#ffffff"><table border="0" cellspacing="0" cellpadding="0" width="100%"><tr>
+
+<td width="99%" class="content" valign="top" align="left">
+<br><h1>File: Denial of Service</h1>
+<form name="contents" action="http://www.gentoo.org">
+<b>Content</b>:
+        <select name="url" size="1" OnChange="location.href=form.url.options[form.url.selectedIndex].value" style="font-family:sans-serif,Arial,Helvetica"><option value="#doc_chap1">1. Gentoo Linux Security Advisory</option>
+<option value="#doc_chap2">2. Impact Information</option>
+<option value="#doc_chap3">3. Resolution Information</option>
+<option value="#doc_chap4">4. References</option></select>
+</form>
+<p class="chaphead"><a name="doc_chap1"></a><span class="chapnum">1. 
+            </span>Gentoo Linux Security Advisory</p>
+
+<p class="secthead"><a name="doc_chap1_sect1">Version Information</a></p>
+<table class="ntable">
+          <tr>
+            <td class="infohead"><b>Advisory Reference</b></td>
+            <td class="tableinfo">GLSA 200704-13 / file</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Release Date</b></td>
+
+            <td class="tableinfo">April 17, 2007</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Latest Revision</b></td>
+            <td class="tableinfo">September 17, 2007: 02</td>
+          </tr>
+          <tr>
+
+            <td class="infohead"><b>Impact</b></td>
+            <td class="tableinfo">normal</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Exploitable</b></td>
+            <td class="tableinfo">remote</td>
+          </tr>
+
+        </table>
+<table class="ntable">
+          <tr>
+            <td class="infohead"><b>Package</b></td>
+            <td class="infohead"><b>Vulnerable versions</b></td>
+            <td class="infohead"><b>Unaffected versions</b></td>
+            <td class="infohead"><b>Architecture(s)</b></td>
+
+          </tr>
+          <tr>
+            <td class="tableinfo">sys-apps/file</td>
+            <td class="tableinfo">
+              =
+            4.21</td>
+            <td class="tableinfo">
+              &gt;=
+            4.21-r1</td>
+
+            <td class="tableinfo">
+            Intel compatible
+          </td>
+          </tr>
+        </table>
+<p>
+Related bugreports: 
+<a href="http://bugs.gentoo.org/show_bug.cgi?id=174217">#174217</a></p>
+<p class="secthead"><a name="doc_chap1_sect2">Synopsis</a></p>
+<p>
+    A vulnerability has been discovered in file allowing for a denial of
+    service.
+  </p>
+
+<p class="chaphead"><a name="doc_chap2"></a><span class="chapnum">2. 
+            </span>Impact Information</p>
+<p class="secthead"><a name="doc_chap2_sect1">Background</a></p>
+<p>
+    file is a utility that identifies a file format by scanning binary data
+    for patterns.
+    </p>
+<p class="secthead"><a name="doc_chap2_sect2">Description</a></p>
+<p>
+    Conor Edberg discovered an error in the way file processes a specific
+    regular expression.
+    </p>
+<p class="secthead"><a name="doc_chap2_sect3">Impact</a></p>
+
+<p>
+    A remote attacker could entice a user to open a specially crafted file,
+    using excessive CPU ressources and possibly leading to a Denial of
+    Service. Note that this vulnerability could be also triggered through
+    an automatic file scanner like amavisd-new.
+    </p>
+<p class="chaphead"><a name="doc_chap3"></a><span class="chapnum">3. 
+            </span>Resolution Information</p>
+<p class="secthead"><a name="doc_chap3_sect1">Workaround</a></p>
+<p>
+    There is no known workaround at this time.
+    </p>
+<p class="secthead"><a name="doc_chap3_sect2">Resolution</a></p>
+<p>
+    All file users should upgrade to the latest version:
+    </p>
+
+<a name="doc_chap3_pre1"></a><table class="ntable" width="100%" cellspacing="0" cellpadding="0" border="0">
+<tr><td bgcolor="#7a5ada"><p class="codetitle">Code Listing 3.1: Resolution</p></td></tr>
+<tr><td bgcolor="#eeeeff" align="left" dir="ltr"><pre># emerge --sync
+# emerge --ask --oneshot --verbose "&gt;=sys-apps/file-4.20-r1"
+</pre></td></tr>
+</table>
+<p class="chaphead"><a name="doc_chap4"></a><span class="chapnum">4. 
+            </span>References</p>
+<ul>
+          <li>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2026">CVE-2007-2026</a>
+          </li>
+
+        </ul>
+<br><br>
+</td>
+<td width="1%" bgcolor="#dddaec" valign="top"><table border="0" cellspacing="4px" cellpadding="4px">
+<tr><td class="topsep" align="center"><p class="altmenu"><a title="View a printer-friendly version" class="altlink" href="/security/en/glsa/glsa-200704-13.xml?style=printable">Print</a></p></td></tr>
+<tr><td class="topsep" align="center"><p class="alttext">Updated April 17, 2007</p></td></tr>
+<tr><td class="topsep" align="left"><p class="alttext"><b>Summary: </b>
+This is a Gentoo Linux Security Advisory
+</p></td></tr>
+<tr><td align="left" class="topsep"><p class="alttext">
+    <a href="mailto:security at gentoo.org" class="altlink"><b>Security Team</b></a>
+
+  <br><i>Contact Address</i><br></p></td></tr>
+<tr lang="en"><td align="center" class="topsep">
+<p class="alttext"><b>Donate</b> to support our development efforts.
+        </p>
+<form action="https://www.paypal.com/cgi-bin/webscr" method="post">
+<input type="hidden" name="cmd" value="_xclick"><input type="hidden" name="business" value="paypal at gentoo.org"><input type="hidden" name="item_name" value="Gentoo Linux Support"><input type="hidden" name="item_number" value="1000"><input type="hidden" name="image_url" value="/images/paypal.png"><input type="hidden" name="no_shipping" value="1"><input type="hidden" name="return" value="http://www.gentoo.org"><input type="hidden" name="cancel_return" value="http://www.gentoo.org"><input type="image" src="http://images.paypal.com/images/x-click-but21.gif" name="submit" alt="Donate to Gentoo">
+</form>
+</td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://osuosl.org/contribute"><img src="../../../images/osuosl.png" width="125" height="50" alt="Support OSL" title="Support OSL" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.vr.org"><img src="../../../images/vr-ad.png" width="125" height="144" alt="Gentoo Centric Hosting: vr.org" title="Gentoo Centric Hosting: vr.org" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.tek.net" target="_top"><img src="../../../images/tek-gentoo.gif" width="125" height="125" alt="Tek Alchemy" title="Tek Alchemy" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.sevenl.net" target="_top"><img src="../../../images/sponsors/sevenl_ad.png" width="125" height="144" alt="SevenL.net" title="SevenL.net" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.gni.com" target="_top"><img src="../../../images/gni_logo.png" width="125" alt="Global Netoptex Inc." title="Global Netoptex Inc." border="0"></a></td></tr>
+
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.bytemark.co.uk/r/gentoo-home" target="_top"><img src="../../../images/sponsors/bytemark_ad.png" width="125" alt="Bytemark" title="Bytemark" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.online-kredit-index.de/" target="_top"><img src="../../../images/sponsors/kredit-ad.jpg" width="125" alt="Online Kredit Index" title="Online Kredit Index" border="0"></a></td></tr>
+<tr><td align="center" class="topsep"></td></tr>
+</table></td>
+</tr></table></td></tr>
+<tr><td colspan="2" align="right" class="infohead">
+Copyright 2001-2009 Gentoo Foundation, Inc. Questions, Comments? <a class="highlight" href="/main/en/contact.xml">Contact us</a>.
+</td></tr>
+</table></body>
+</html>
+

Added: trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200804-30.html
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200804-30.html	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200804-30.html	2009-05-20 14:24:39 UTC (rev 3452)
@@ -0,0 +1,177 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
+<html lang="en">
+<head>
+<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+<link title="new" rel="stylesheet" href="../../../css/main.css" type="text/css">
+<link REL="shortcut icon" HREF="../../../favicon.ico" TYPE="image/x-icon">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/www-gentoo-org.xml" title="Gentoo Website">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/forums-gentoo-org.xml" title="Gentoo Forums">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/bugs-gentoo-org.xml" title="Gentoo Bugzilla">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/packages-gentoo-org.xml" title="Gentoo Packages">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/archives-gentoo-org.xml" title="Gentoo List Archives">
+<title>Gentoo Linux Documentation
+--
+  KDE start_kdeinit: Multiple vulnerabilities</title>
+</head>
+<body style="margin:0px;" bgcolor="#ffffff"><table width="100%" border="0" cellspacing="0" cellpadding="0">
+<tr><td valign="top" height="125" bgcolor="#45347b"><a href="/"><img border="0" src="../../../images/gtop-www.jpg" alt="Gentoo Logo"></a></td></tr>
+<tr><td valign="top" align="right" colspan="1" bgcolor="#ffffff"><table border="0" cellspacing="0" cellpadding="0" width="100%"><tr>
+
+<td width="99%" class="content" valign="top" align="left">
+<br><h1>KDE start_kdeinit: Multiple vulnerabilities</h1>
+<form name="contents" action="http://www.gentoo.org">
+<b>Content</b>:
+        <select name="url" size="1" OnChange="location.href=form.url.options[form.url.selectedIndex].value" style="font-family:sans-serif,Arial,Helvetica"><option value="#doc_chap1">1. Gentoo Linux Security Advisory</option>
+<option value="#doc_chap2">2. Impact Information</option>
+<option value="#doc_chap3">3. Resolution Information</option>
+<option value="#doc_chap4">4. References</option></select>
+</form>
+<p class="chaphead"><a name="doc_chap1"></a><span class="chapnum">1. 
+            </span>Gentoo Linux Security Advisory</p>
+
+<p class="secthead"><a name="doc_chap1_sect1">Version Information</a></p>
+<table class="ntable">
+          <tr>
+            <td class="infohead"><b>Advisory Reference</b></td>
+            <td class="tableinfo">GLSA 200804-30 / kdelibs</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Release Date</b></td>
+
+            <td class="tableinfo">April 29, 2008</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Latest Revision</b></td>
+            <td class="tableinfo">April 08, 2009: 02</td>
+          </tr>
+          <tr>
+
+            <td class="infohead"><b>Impact</b></td>
+            <td class="tableinfo">high</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Exploitable</b></td>
+            <td class="tableinfo">local</td>
+          </tr>
+
+        </table>
+<table class="ntable">
+          <tr>
+            <td class="infohead"><b>Package</b></td>
+            <td class="infohead"><b>Vulnerable versions</b></td>
+            <td class="infohead"><b>Unaffected versions</b></td>
+            <td class="infohead"><b>Architecture(s)</b></td>
+
+          </tr>
+          <tr>
+            <td class="tableinfo">kde-base/kdelibs</td>
+            <td class="tableinfo">
+              &lt;
+            4.0</td>
+            <td class="tableinfo">
+              revision &gt;=
+            3.5.8-r4, 
+              revision &gt;=
+            3.5.9-r3, 
+              &gt;
+
+            4.0, 
+              &lt;
+            3.5.5, 
+              revision &gt;=
+            3.5.10-r2</td>
+            <td class="tableinfo">
+            All supported architectures
+          </td>
+          </tr>
+        </table>
+<p>
+
+Related bugreports: 
+<a href="http://bugs.gentoo.org/show_bug.cgi?id=218933">#218933</a></p>
+<p class="secthead"><a name="doc_chap1_sect2">Synopsis</a></p>
+<p>
+    Multiple vulnerabilities in start_kdeinit could possibly allow a local
+    attacker to execute arbitrary code with root privileges.
+  </p>
+<p class="chaphead"><a name="doc_chap2"></a><span class="chapnum">2. 
+            </span>Impact Information</p>
+<p class="secthead"><a name="doc_chap2_sect1">Background</a></p>
+<p>
+    KDE is a feature-rich graphical desktop environment for Linux and
+    Unix-like operating systems. start_kdeinit is a wrapper for kdeinit.
+    </p>
+
+<p class="secthead"><a name="doc_chap2_sect2">Description</a></p>
+<p>
+    Vulnerabilities have been reported in the processing of user-controlled
+    data by start_kdeinit, which is setuid root by default.
+    </p>
+<p class="secthead"><a name="doc_chap2_sect3">Impact</a></p>
+<p>
+    A local attacker could possibly execute arbitrary code with root
+    privileges, cause a Denial of Service or send Unix signals to other
+    processes, when start_kdeinit is setuid root.
+    </p>
+<p class="chaphead"><a name="doc_chap3"></a><span class="chapnum">3. 
+            </span>Resolution Information</p>
+<p class="secthead"><a name="doc_chap3_sect1">Workaround</a></p>
+
+<p>
+    There is no known workaround at this time.
+    </p>
+<p class="secthead"><a name="doc_chap3_sect2">Resolution</a></p>
+<p>
+    All kdelibs users should upgrade to the latest version:
+    </p>
+<a name="doc_chap3_pre1"></a><table class="ntable" width="100%" cellspacing="0" cellpadding="0" border="0">
+<tr><td bgcolor="#7a5ada"><p class="codetitle">Code Listing 3.1: Resolution</p></td></tr>
+<tr><td bgcolor="#eeeeff" align="left" dir="ltr"><pre># emerge --sync
+# emerge --ask --oneshot --verbose "&gt;=kde-base/kdelibs-3.5.8-r4"
+</pre></td></tr>
+</table>
+
+<p class="chaphead"><a name="doc_chap4"></a><span class="chapnum">4. 
+            </span>References</p>
+<ul>
+          <li>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1671">CVE-2008-1671</a>
+          </li>
+        </ul>
+<br><br>
+</td>
+<td width="1%" bgcolor="#dddaec" valign="top"><table border="0" cellspacing="4px" cellpadding="4px">
+<tr><td class="topsep" align="center"><p class="altmenu"><a title="View a printer-friendly version" class="altlink" href="/security/en/glsa/glsa-200804-30.xml?style=printable">Print</a></p></td></tr>
+
+<tr><td class="topsep" align="center"><p class="alttext">Updated April 29, 2008</p></td></tr>
+<tr><td class="topsep" align="left"><p class="alttext"><b>Summary: </b>
+This is a Gentoo Linux Security Advisory
+</p></td></tr>
+<tr><td align="left" class="topsep"><p class="alttext">
+    <a href="mailto:security at gentoo.org" class="altlink"><b>Security Team</b></a>
+  <br><i>Contact Address</i><br></p></td></tr>
+<tr lang="en"><td align="center" class="topsep">
+<p class="alttext"><b>Donate</b> to support our development efforts.
+        </p>
+
+<form action="https://www.paypal.com/cgi-bin/webscr" method="post">
+<input type="hidden" name="cmd" value="_xclick"><input type="hidden" name="business" value="paypal at gentoo.org"><input type="hidden" name="item_name" value="Gentoo Linux Support"><input type="hidden" name="item_number" value="1000"><input type="hidden" name="image_url" value="/images/paypal.png"><input type="hidden" name="no_shipping" value="1"><input type="hidden" name="return" value="http://www.gentoo.org"><input type="hidden" name="cancel_return" value="http://www.gentoo.org"><input type="image" src="http://images.paypal.com/images/x-click-but21.gif" name="submit" alt="Donate to Gentoo">
+</form>
+</td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://osuosl.org/contribute"><img src="../../../images/osuosl.png" width="125" height="50" alt="Support OSL" title="Support OSL" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.vr.org"><img src="../../../images/vr-ad.png" width="125" height="144" alt="Gentoo Centric Hosting: vr.org" title="Gentoo Centric Hosting: vr.org" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.tek.net" target="_top"><img src="../../../images/tek-gentoo.gif" width="125" height="125" alt="Tek Alchemy" title="Tek Alchemy" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.sevenl.net" target="_top"><img src="../../../images/sponsors/sevenl_ad.png" width="125" height="144" alt="SevenL.net" title="SevenL.net" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.gni.com" target="_top"><img src="../../../images/gni_logo.png" width="125" alt="Global Netoptex Inc." title="Global Netoptex Inc." border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.bytemark.co.uk/r/gentoo-home" target="_top"><img src="../../../images/sponsors/bytemark_ad.png" width="125" alt="Bytemark" title="Bytemark" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.online-kredit-index.de/" target="_top"><img src="../../../images/sponsors/kredit-ad.jpg" width="125" alt="Online Kredit Index" title="Online Kredit Index" border="0"></a></td></tr>
+<tr><td align="center" class="topsep"></td></tr>
+</table></td>
+</tr></table></td></tr>
+<tr><td colspan="2" align="right" class="infohead">
+Copyright 2001-2009 Gentoo Foundation, Inc. Questions, Comments? <a class="highlight" href="/main/en/contact.xml">Contact us</a>.
+
+</td></tr>
+</table></body>
+</html>
+

Added: trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200903-37.html
===================================================================
--- trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200903-37.html	2009-05-20 14:16:16 UTC (rev 3451)
+++ trunk/openvas-plugins/extra/lsc_generator/test/unit_test/work/input/glsa-200903-37.html	2009-05-20 14:24:39 UTC (rev 3452)
@@ -0,0 +1,226 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
+<html lang="en">
+<head>
+<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+<link title="new" rel="stylesheet" href="../../../css/main.css" type="text/css">
+<link REL="shortcut icon" HREF="../../../favicon.ico" TYPE="image/x-icon">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/www-gentoo-org.xml" title="Gentoo Website">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/forums-gentoo-org.xml" title="Gentoo Forums">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/bugs-gentoo-org.xml" title="Gentoo Bugzilla">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/packages-gentoo-org.xml" title="Gentoo Packages">
+<link rel="search" type="application/opensearchdescription+xml" href="http://www.gentoo.org/search/archives-gentoo-org.xml" title="Gentoo List Archives">
+<title>Gentoo Linux Documentation
+--
+  Ghostscript: User-assisted execution of arbitrary code</title>
+</head>
+<body style="margin:0px;" bgcolor="#ffffff"><table width="100%" border="0" cellspacing="0" cellpadding="0">
+<tr><td valign="top" height="125" bgcolor="#45347b"><a href="/"><img border="0" src="../../../images/gtop-www.jpg" alt="Gentoo Logo"></a></td></tr>
+<tr><td valign="top" align="right" colspan="1" bgcolor="#ffffff"><table border="0" cellspacing="0" cellpadding="0" width="100%"><tr>
+
+<td width="99%" class="content" valign="top" align="left">
+<br><h1>Ghostscript: User-assisted execution of arbitrary code</h1>
+<form name="contents" action="http://www.gentoo.org">
+<b>Content</b>:
+        <select name="url" size="1" OnChange="location.href=form.url.options[form.url.selectedIndex].value" style="font-family:sans-serif,Arial,Helvetica"><option value="#doc_chap1">1. Gentoo Linux Security Advisory</option>
+<option value="#doc_chap2">2. Impact Information</option>
+<option value="#doc_chap3">3. Resolution Information</option>
+<option value="#doc_chap4">4. References</option></select>
+</form>
+<p class="chaphead"><a name="doc_chap1"></a><span class="chapnum">1. 
+            </span>Gentoo Linux Security Advisory</p>
+
+<p class="secthead"><a name="doc_chap1_sect1">Version Information</a></p>
+<table class="ntable">
+          <tr>
+            <td class="infohead"><b>Advisory Reference</b></td>
+            <td class="tableinfo">GLSA 200903-37 / ghostscript-gpl ghostscript-esp ghostscript-gnu</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Release Date</b></td>
+
+            <td class="tableinfo">March 23, 2009</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Latest Revision</b></td>
+            <td class="tableinfo">March 23, 2009: 01</td>
+          </tr>
+          <tr>
+
+            <td class="infohead"><b>Impact</b></td>
+            <td class="tableinfo">normal</td>
+          </tr>
+          <tr>
+            <td class="infohead"><b>Exploitable</b></td>
+            <td class="tableinfo">remote</td>
+          </tr>
+
+        </table>
+<table class="ntable">
+          <tr>
+            <td class="infohead"><b>Package</b></td>
+            <td class="infohead"><b>Vulnerable versions</b></td>
+            <td class="infohead"><b>Unaffected versions</b></td>
+            <td class="infohead"><b>Architecture(s)</b></td>
+
+          </tr>
+          <tr>
+            <td class="tableinfo">app-text/ghostscript-gpl</td>
+            <td class="tableinfo">
+              &lt;
+            8.64-r2</td>
+            <td class="tableinfo">
+              &gt;=
+            8.64-r2</td>
+
+            <td class="tableinfo">
+            All supported architectures
+          </td>
+          </tr>
+          <tr>
+            <td class="tableinfo">app-text/ghostscript-gnu</td>
+            <td class="tableinfo">
+              &lt;
+            8.62.0</td>
+
+            <td class="tableinfo">
+              &gt;=
+            8.62.0</td>
+            <td class="tableinfo">
+            All supported architectures
+          </td>
+          </tr>
+          <tr>
+            <td class="tableinfo">app-text/ghostscript-esp</td>
+
+            <td class="tableinfo">
+              &lt;=
+            8.15.4-r1</td>
+            <td class="tableinfo"></td>
+            <td class="tableinfo">
+            All supported architectures
+          </td>
+          </tr>
+        </table>
+<p>
+
+Related bugreports: 
+<a href="http://bugs.gentoo.org/show_bug.cgi?id=261087">#261087</a></p>
+<p class="secthead"><a name="doc_chap1_sect2">Synopsis</a></p>
+<p>
+    Multiple integer overflows in the Ghostscript ICC library might allow for
+    user-assisted execution of arbitrary code.
+  </p>
+<p class="chaphead"><a name="doc_chap2"></a><span class="chapnum">2. 
+            </span>Impact Information</p>
+<p class="secthead"><a name="doc_chap2_sect1">Background</a></p>
+<p>
+    Ghostscript is an interpreter for the PostScript language and the
+    Portable Document Format (PDF).
+    </p>
+
+<p class="secthead"><a name="doc_chap2_sect2">Description</a></p>
+<p>
+    Jan Lieskovsky from the Red Hat Security Response Team discovered the
+    following vulnerabilities in Ghostscript's ICC Library:
+    </p>
+<ul>
+<li>Multiple integer overflows (CVE-2009-0583).</li>
+<li>Multiple
+    insufficient bounds checks on certain variable sizes
+    (CVE-2009-0584).</li>
+</ul>
+<p class="secthead"><a name="doc_chap2_sect3">Impact</a></p>
+<p>
+    A remote attacker could entice a user to open a specially crafted
+    PostScript file containing images and a malicious ICC profile, possibly
+    resulting in the execution of arbitrary code with the privileges of the
+    user running the application.
+    </p>
+
+<p class="chaphead"><a name="doc_chap3"></a><span class="chapnum">3. 
+            </span>Resolution Information</p>
+<p class="secthead"><a name="doc_chap3_sect1">Workaround</a></p>
+<p>
+    There is no known workaround at this time.
+    </p>
+<p class="secthead"><a name="doc_chap3_sect2">Resolution</a></p>
+<p>
+    All GPL Ghostscript users should upgrade to the latest version:
+    </p>
+<a name="doc_chap3_pre1"></a><table class="ntable" width="100%" cellspacing="0" cellpadding="0" border="0">
+<tr><td bgcolor="#7a5ada"><p class="codetitle">Code Listing 3.1: Resolution</p></td></tr>
+
+<tr><td bgcolor="#eeeeff" align="left" dir="ltr"><pre># emerge --sync
+# emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gpl-8.64-r2"
+</pre></td></tr>
+</table>
+<p>
+    All GNU Ghostscript users should upgrade to the latest version:
+    </p>
+<a name="doc_chap3_pre2"></a><table class="ntable" width="100%" cellspacing="0" cellpadding="0" border="0">
+<tr><td bgcolor="#7a5ada"><p class="codetitle">Code Listing 3.2: Resolution</p></td></tr>
+<tr><td bgcolor="#eeeeff" align="left" dir="ltr"><pre># emerge --sync
+# emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gnu-8.62.0"
+</pre></td></tr>
+</table>
+<p>
+    We recommend that users unmerge ESP Ghostscript and use GPL or GNU
+    Ghostscript instead:
+    </p>
+
+<a name="doc_chap3_pre3"></a><table class="ntable" width="100%" cellspacing="0" cellpadding="0" border="0">
+<tr><td bgcolor="#7a5ada"><p class="codetitle">Code Listing 3.3: Resolution</p></td></tr>
+<tr><td bgcolor="#eeeeff" align="left" dir="ltr"><pre># emerge --unmerge "app-text/ghostscript-esp"
+</pre></td></tr>
+</table>
+<p>
+    For installation instructions, see above.
+    </p>
+<p class="chaphead"><a name="doc_chap4"></a><span class="chapnum">4. 
+            </span>References</p>
+<ul>
+          <li>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583">CVE-2009-0583</a>
+
+          </li>
+          <li>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584">CVE-2009-0584</a>
+          </li>
+        </ul>
+<br><br>
+</td>
+<td width="1%" bgcolor="#dddaec" valign="top"><table border="0" cellspacing="4px" cellpadding="4px">
+<tr><td class="topsep" align="center"><p class="altmenu"><a title="View a printer-friendly version" class="altlink" href="/security/en/glsa/glsa-200903-37.xml?style=printable">Print</a></p></td></tr>
+<tr><td class="topsep" align="center"><p class="alttext">Updated March 23, 2009</p></td></tr>
+
+<tr><td class="topsep" align="left"><p class="alttext"><b>Summary: </b>
+This is a Gentoo Linux Security Advisory
+</p></td></tr>
+<tr><td align="left" class="topsep"><p class="alttext">
+    <a href="mailto:security at gentoo.org" class="altlink"><b>Security Team</b></a>
+  <br><i>Contact Address</i><br></p></td></tr>
+<tr lang="en"><td align="center" class="topsep">
+<p class="alttext"><b>Donate</b> to support our development efforts.
+        </p>
+<form action="https://www.paypal.com/cgi-bin/webscr" method="post">
+
+<input type="hidden" name="cmd" value="_xclick"><input type="hidden" name="business" value="paypal at gentoo.org"><input type="hidden" name="item_name" value="Gentoo Linux Support"><input type="hidden" name="item_number" value="1000"><input type="hidden" name="image_url" value="/images/paypal.png"><input type="hidden" name="no_shipping" value="1"><input type="hidden" name="return" value="http://www.gentoo.org"><input type="hidden" name="cancel_return" value="http://www.gentoo.org"><input type="image" src="http://images.paypal.com/images/x-click-but21.gif" name="submit" alt="Donate to Gentoo">
+</form>
+</td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://osuosl.org/contribute"><img src="../../../images/osuosl.png" width="125" height="50" alt="Support OSL" title="Support OSL" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.vr.org"><img src="../../../images/vr-ad.png" width="125" height="144" alt="Gentoo Centric Hosting: vr.org" title="Gentoo Centric Hosting: vr.org" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.tek.net" target="_top"><img src="../../../images/tek-gentoo.gif" width="125" height="125" alt="Tek Alchemy" title="Tek Alchemy" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.sevenl.net" target="_top"><img src="../../../images/sponsors/sevenl_ad.png" width="125" height="144" alt="SevenL.net" title="SevenL.net" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.gni.com" target="_top"><img src="../../../images/gni_logo.png" width="125" alt="Global Netoptex Inc." title="Global Netoptex Inc." border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.bytemark.co.uk/r/gentoo-home" target="_top"><img src="../../../images/sponsors/bytemark_ad.png" width="125" alt="Bytemark" title="Bytemark" border="0"></a></td></tr>
+<tr lang="en"><td align="center" class="topsep"><a href="http://www.online-kredit-index.de/" target="_top"><img src="../../../images/sponsors/kredit-ad.jpg" width="125" alt="Online Kredit Index" title="Online Kredit Index" border="0"></a></td></tr>
+<tr><td align="center" class="topsep"></td></tr>
+</table></td>
+</tr></table></td></tr>
+<tr><td colspan="2" align="right" class="infohead">
+Copyright 2001-2009 Gentoo Foundation, Inc. Questions, Comments? <a class="highlight" href="/main/en/contact.xml">Contact us</a>.
+
+</td></tr>
+</table></body>
+</html>
+



More information about the Openvas-commits mailing list