aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--security/vuxml/vuln.xml81
1 files changed, 81 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 9d9ab4ac159c..97cbff4e96ac 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,87 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1fade8a3-e9e8-11e0-9580-4061862b8c22">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><gt>4.0,1</gt><lt>7.0,1</lt></range>
+ <range><gt>3.6.*,1</gt><lt>3.6.23,1</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <range><gt>1.9.2.*</gt><lt>1.9.2.23</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>7.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-seamonkey</name>
+ <range><lt>2.4</lt></range>
+ </package>
+ <package>
+ <name>linux-thunderbird</name>
+ <range><lt>7.0</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <range><lt>2.4</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><gt>4.0</gt><lt>7.0</lt></range>
+ <range><lt>3.1.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Project reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
+ <p>MFSA 2011-36 Miscellaneous memory safety hazards (rv:7.0 / rv:1.9.2.23)</p>
+ <p>MFSA 2011-37 Integer underflow when using JavaScript RegExp</p>
+ <p>MFSA 2011-38 XSS via plugins and shadowed window.location object</p>
+ <p>MFSA 2011-39 Defense against multiple Location headers due to CRLF Injection</p>
+ <p>MFSA 2011-40 Code installation through holding down Enter</p>
+ <p>MFSA 2011-41 Potentially exploitable WebGL crashes</p>
+ <p>MFSA 2011-42 Potentially exploitable crash in the YARR regular expression library</p>
+ <p>MFSA 2011-43 loadSubScript unwraps XPCNativeWrapper scope parameter</p>
+ <p>MFSA 2011-44 Use after free reading OGG headers</p>
+ <p>MFSA 2011-45 Inferring Keystrokes from motion data</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-2372</cvename>
+ <cvename>CVE-2011-2995</cvename>
+ <cvename>CVE-2011-2996</cvename>
+ <cvename>CVE-2011-2997</cvename>
+ <cvename>CVE-2011-2999</cvename>
+ <cvename>CVE-2011-3000</cvename>
+ <cvename>CVE-2011-3001</cvename>
+ <cvename>CVE-2011-3002</cvename>
+ <cvename>CVE-2011-3003</cvename>
+ <cvename>CVE-2011-3004</cvename>
+ <cvename>CVE-2011-3005</cvename>
+ <cvename>CVE-2011-3232</cvename>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-36.html</url>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-37.html</url>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-38.html</url>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-39.html</url>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-40.html</url>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-41.html</url>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-42.html</url>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-43.html</url>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-44.html</url>
+ <url>http://www.mozilla.org/security/announce/2011/mfsa2011-45.html</url>
+ </references>
+ <dates>
+ <discovery>2011-09-27</discovery>
+ <entry>2011-09-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="53e531a7-e559-11e0-b481-001b2134ef46">
<topic>linux-flashplugin -- multiple vulnerabilities</topic>
<affects>