diff options
author | Beat Gaetzi <beat@FreeBSD.org> | 2010-03-19 07:39:28 +0000 |
---|---|---|
committer | Beat Gaetzi <beat@FreeBSD.org> | 2010-03-19 07:39:28 +0000 |
commit | 16fd879141a6b381fa7b88f5a1a0877a061b117a (patch) | |
tree | 60e6fb5cba878933c40707aeb10f04fec7cdf3c0 /security | |
parent | 6e3a41a82f352e08437540801a10385b72468400 (diff) | |
download | ports-16fd879141a6b381fa7b88f5a1a0877a061b117a.tar.gz ports-16fd879141a6b381fa7b88f5a1a0877a061b117a.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 53 |
1 files changed, 52 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 81776a89c557..8a35101ba74b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,57 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="56cfe192-329f-11df-abb2-000f20797ede"> + <topic>mozilla -- multiple vulnerabilities</topic> + <affects> + <package> + <name>seamonkey</name> + <name>linux-seamonkey</name> + <range><lt>1.1.19</lt></range> + </package> + <package> + <name>thunderbird</name> + <name>linux-thunderbird</name> + <range><lt>2.0.0.24</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mozilla Project reports:</p> + <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/"> + <p>MFSA 2010-07 Fixes for potentially exploitable crashes ported to the legacy branch</p> + <p>MFSA 2010-06 Scriptable plugin execution in SeaMonkey mail</p> + <p>MFSA 2009-68 NTLM reflection vulnerability</p> + <p>MFSA 2009-62 Download filename spoofing with RTL override</p> + <p>MFSA 2009-59 Heap buffer overflow in string to number conversion</p> + <p>MFSA 2009-49 TreeColumns dangling pointer vulnerability</p> + </blockquote> + </body> + </description> + <references> + <cvename>2010-0161</cvename> + <cvename>2010-0163</cvename> + <cvename>2009-3075</cvename> + <cvename>2009-3072</cvename> + <cvename>2009-2463</cvename> + <cvename>2009-3385</cvename> + <cvename>2009-3983</cvename> + <cvename>2009-3376</cvename> + <cvename>2009-0689</cvename> + <cvename>2009-3077</cvename> + <url>http://www.mozilla.org/security/announce/2010/mfsa2010-07.html</url> + <url>http://www.mozilla.org/security/announce/2010/mfsa2010-06.html</url> + <url>http://www.mozilla.org/security/announce/2009/mfsa2009-68.html</url> + <url>http://www.mozilla.org/security/announce/2009/mfsa2009-62.html</url> + <url>http://www.mozilla.org/security/announce/2009/mfsa2009-59.html</url> + <url>http://www.mozilla.org/security/announce/2009/mfsa2009-49.html</url> + </references> + <dates> + <discovery>2010-03-16</discovery> + <entry>2010-03-19</entry> + </dates> + </vuln> + <vuln vid="e39caf05-2d6f-11df-aec2-000c29ba66d2"> <topic>egroupware -- two vulnerabilities</topic> <affects> @@ -1077,7 +1128,7 @@ Note: Please add new entries to the beginning of this file. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Mozilla Porject reports:</p> + <p>Mozilla Project reports:</p> <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/"> <p>MFSA 2009-71 GeckoActiveXObject exception messages can be used to enumerate installed COM objects</p> |