aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorBeat Gaetzi <beat@FreeBSD.org>2010-03-19 07:39:28 +0000
committerBeat Gaetzi <beat@FreeBSD.org>2010-03-19 07:39:28 +0000
commit16fd879141a6b381fa7b88f5a1a0877a061b117a (patch)
tree60e6fb5cba878933c40707aeb10f04fec7cdf3c0 /security
parent6e3a41a82f352e08437540801a10385b72468400 (diff)
downloadports-16fd879141a6b381fa7b88f5a1a0877a061b117a.tar.gz
ports-16fd879141a6b381fa7b88f5a1a0877a061b117a.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml53
1 files changed, 52 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 81776a89c557..8a35101ba74b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,57 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="56cfe192-329f-11df-abb2-000f20797ede">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>1.1.19</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <range><lt>2.0.0.24</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Project reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
+ <p>MFSA 2010-07 Fixes for potentially exploitable crashes ported to the legacy branch</p>
+ <p>MFSA 2010-06 Scriptable plugin execution in SeaMonkey mail</p>
+ <p>MFSA 2009-68 NTLM reflection vulnerability</p>
+ <p>MFSA 2009-62 Download filename spoofing with RTL override</p>
+ <p>MFSA 2009-59 Heap buffer overflow in string to number conversion</p>
+ <p>MFSA 2009-49 TreeColumns dangling pointer vulnerability</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>2010-0161</cvename>
+ <cvename>2010-0163</cvename>
+ <cvename>2009-3075</cvename>
+ <cvename>2009-3072</cvename>
+ <cvename>2009-2463</cvename>
+ <cvename>2009-3385</cvename>
+ <cvename>2009-3983</cvename>
+ <cvename>2009-3376</cvename>
+ <cvename>2009-0689</cvename>
+ <cvename>2009-3077</cvename>
+ <url>http://www.mozilla.org/security/announce/2010/mfsa2010-07.html</url>
+ <url>http://www.mozilla.org/security/announce/2010/mfsa2010-06.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-68.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-62.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-59.html</url>
+ <url>http://www.mozilla.org/security/announce/2009/mfsa2009-49.html</url>
+ </references>
+ <dates>
+ <discovery>2010-03-16</discovery>
+ <entry>2010-03-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e39caf05-2d6f-11df-aec2-000c29ba66d2">
<topic>egroupware -- two vulnerabilities</topic>
<affects>
@@ -1077,7 +1128,7 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Mozilla Porject reports:</p>
+ <p>Mozilla Project reports:</p>
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
<p>MFSA 2009-71 GeckoActiveXObject exception messages can be used to
enumerate installed COM objects</p>