diff options
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 86 |
1 files changed, 86 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 964c7b810cad..900181866cfa 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,92 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="94976433-9c74-11e2-a9fc-d43d7e0c7c02"> + <topic>mozilla -- multiple vulnerabilities</topic> + <affects> + <package> + <name>firefox</name> + <range><gt>18.0,1</gt><lt>20.0,1</lt></range> + <range><lt>17.0.3,1</lt></range> + </package> + <package> + <name>linux-firefox</name> + <range><lt>17.0.5,1</lt></range> + </package> + <package> + <name>linux-seamonkey</name> + <range><lt>2.17</lt></range> + </package> + <package> + <name>linux-thunderbird</name> + <range><lt>17.0.5</lt></range> + </package> + <package> + <name>seamonkey</name> + <range><lt>2.17</lt></range> + </package> + <package> + <name>thunderbird</name> + <range><gt>11.0</gt><lt>17.0.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Mozilla Project reports:</p> + <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/"> + <p>MFSA 2013-30 Miscellaneous memory safety hazards (rv:20.0 / + rv:17.0.5)</p> + <p>MFSA 2013-31 Out-of-bounds write in Cairo library</p> + <p>MFSA 2013-32 Privilege escalation through Mozilla Maintenance + Service</p> + <p>MFSA 2013-33 World read and write access to app_tmp directory on + Android</p> + <p>MFSA 2013-34 Privilege escalation through Mozilla Updater</p> + <p>MFSA 2013-35 WebGL crash with Mesa graphics driver on Linux</p> + <p>MFSA 2013-36 Bypass of SOW protections allows cloning of protected + nodes</p> + <p>MFSA 2013-37 Bypass of tab-modal dialog origin disclosure</p> + <p>MFSA 2013-38 Cross-site scripting (XSS) using timed history + navigations</p> + <p>MFSA 2013-39 Memory corruption while rendering grayscale PNG + images</p> + <p>MFSA 2013-40 Out-of-bounds array read in CERT_DecodeCertPackage</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-0788</cvename> + <cvename>CVE-2013-0789</cvename> + <cvename>CVE-2013-0790</cvename> + <cvename>CVE-2013-0791</cvename> + <cvename>CVE-2013-0792</cvename> + <cvename>CVE-2013-0793</cvename> + <cvename>CVE-2013-0794</cvename> + <cvename>CVE-2013-0795</cvename> + <cvename>CVE-2013-0796</cvename> + <cvename>CVE-2013-0797</cvename> + <cvename>CVE-2013-0798</cvename> + <cvename>CVE-2013-0799</cvename> + <cvename>CVE-2013-0800</cvename> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-30.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-31.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-32.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-33.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-34.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-35.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-36.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-37.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-38.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-39.html</url> + <url>http://www.mozilla.org/security/announce/2013/mfsa2013-40.html</url> + <url>http://www.mozilla.org/security/known-vulnerabilities/</url> + </references> + <dates> + <discovery>2013-04-02</discovery> + <entry>2013-04-03</entry> + </dates> + </vuln> + <vuln vid="13031d98-9bd1-11e2-a7be-8c705af55518"> <topic>FreeBSD -- BIND remote denial of service</topic> <affects> |