aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml86
1 files changed, 86 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 964c7b810cad..900181866cfa 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,92 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="94976433-9c74-11e2-a9fc-d43d7e0c7c02">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><gt>18.0,1</gt><lt>20.0,1</lt></range>
+ <range><lt>17.0.3,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>17.0.5,1</lt></range>
+ </package>
+ <package>
+ <name>linux-seamonkey</name>
+ <range><lt>2.17</lt></range>
+ </package>
+ <package>
+ <name>linux-thunderbird</name>
+ <range><lt>17.0.5</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <range><lt>2.17</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><gt>11.0</gt><lt>17.0.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Project reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
+ <p>MFSA 2013-30 Miscellaneous memory safety hazards (rv:20.0 /
+ rv:17.0.5)</p>
+ <p>MFSA 2013-31 Out-of-bounds write in Cairo library</p>
+ <p>MFSA 2013-32 Privilege escalation through Mozilla Maintenance
+ Service</p>
+ <p>MFSA 2013-33 World read and write access to app_tmp directory on
+ Android</p>
+ <p>MFSA 2013-34 Privilege escalation through Mozilla Updater</p>
+ <p>MFSA 2013-35 WebGL crash with Mesa graphics driver on Linux</p>
+ <p>MFSA 2013-36 Bypass of SOW protections allows cloning of protected
+ nodes</p>
+ <p>MFSA 2013-37 Bypass of tab-modal dialog origin disclosure</p>
+ <p>MFSA 2013-38 Cross-site scripting (XSS) using timed history
+ navigations</p>
+ <p>MFSA 2013-39 Memory corruption while rendering grayscale PNG
+ images</p>
+ <p>MFSA 2013-40 Out-of-bounds array read in CERT_DecodeCertPackage</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-0788</cvename>
+ <cvename>CVE-2013-0789</cvename>
+ <cvename>CVE-2013-0790</cvename>
+ <cvename>CVE-2013-0791</cvename>
+ <cvename>CVE-2013-0792</cvename>
+ <cvename>CVE-2013-0793</cvename>
+ <cvename>CVE-2013-0794</cvename>
+ <cvename>CVE-2013-0795</cvename>
+ <cvename>CVE-2013-0796</cvename>
+ <cvename>CVE-2013-0797</cvename>
+ <cvename>CVE-2013-0798</cvename>
+ <cvename>CVE-2013-0799</cvename>
+ <cvename>CVE-2013-0800</cvename>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-30.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-31.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-32.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-33.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-34.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-35.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-36.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-37.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-38.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-39.html</url>
+ <url>http://www.mozilla.org/security/announce/2013/mfsa2013-40.html</url>
+ <url>http://www.mozilla.org/security/known-vulnerabilities/</url>
+ </references>
+ <dates>
+ <discovery>2013-04-02</discovery>
+ <entry>2013-04-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="13031d98-9bd1-11e2-a7be-8c705af55518">
<topic>FreeBSD -- BIND remote denial of service</topic>
<affects>