aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2009-04-22 16:38:33 +0800
committermiwi <miwi@FreeBSD.org>2009-04-22 16:38:33 +0800
commitd7fe3084cade4ed1f8b9bcf781860fd52596af9f (patch)
tree135ee99f6215947c2079613f5c83228163571000
parent3985a403618606924d43680fa093d98561e647da (diff)
downloadfreebsd-ports-gnome-d7fe3084cade4ed1f8b9bcf781860fd52596af9f.tar.gz
freebsd-ports-gnome-d7fe3084cade4ed1f8b9bcf781860fd52596af9f.tar.zst
freebsd-ports-gnome-d7fe3084cade4ed1f8b9bcf781860fd52596af9f.zip
- Document mozilla -- multiple vulnerabilities
-rw-r--r--security/vuxml/vuln.xml78
1 files changed, 78 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c1b84644b068..a78ab718cd38 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,84 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3b18e237-2f15-11de-9672-0030843d3802">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>2.0.0.20_7,1</lt></range>
+ <range><gt>3.*,1</gt><lt>3.0.9,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <name>linux-firefox-devel</name>
+ <name>linux-seamonkey-devel</name>
+ <range><gt>0</gt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>1.1.17</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <range><lt>2.0.0.22</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
+ <p>MFSA 2009-22: Firefox allows Refresh header to redirect to
+ javascript: URIs</p>
+ <p>MFSA 2009-21: POST data sent to wrong site when saving web page
+ with embedded frame</p>
+ <p>MFSA 2009-20: Malicious search plugins can inject code into
+ arbitrary sites</p>
+ <p>MFSA 2009-19: Same-origin violations in XMLHttpRequest and
+ XPCNativeWrapper.toString</p>
+ <p>MFSA 2009-18: XSS hazard using third-party stylesheets and XBL
+ bindings</p>
+ <p>MFSA 2009-17: Same-origin violations when Adobe Flash loaded via
+ view-source: scheme</p>
+ <p>MFSA 2009-16: jar: scheme ignores the content-disposition: header
+ on the inner URI</p>
+ <p>MFSA 2009-15: URL spoofing with box drawing character</p>
+ <p>MFSA 2009-14 Crashes with evidence of memory corruption
+ (rv:1.9.0.9)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>34656</bid>
+ <cvename>CVE-2009-1303</cvename>
+ <cvename>CVE-2009-1306</cvename>
+ <cvename>CVE-2009-1307</cvename>
+ <cvename>CVE-2009-1308</cvename>
+ <cvename>CVE-2009-1309</cvename>
+ <cvename>CVE-2009-1312</cvename>
+ <cvename>CVE-2009-1311</cvename>
+ <cvename>CVE-2009-1302</cvename>
+ <cvename>CVE-2009-1304</cvename>
+ <cvename>CVE-2009-1305</cvename>
+ <cvename>CVE-2009-1310</cvename>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-22.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-21.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-20.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-19.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-18.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-17.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-16.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-15.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-14.html</url>
+ </references>
+ <dates>
+ <discovery>2009-04-21</discovery>
+ <entry>2009-04-22</entry>
+ </dates>
+ </vuln>
+
<vuln vid="50d233d9-374b-46ce-922d-4e6b3f777bef">
<topic>poppler -- Poppler Multiple Vulnerabilities</topic>
<affects>