aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml108
1 files changed, 108 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c4513a90d7e1..5dfb954b9a45 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,114 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="6e5a9afd-12d3-11e2-b47d-c8600054b392">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><gt>11.0,1</gt><lt>16.0,1</lt></range>
+ <range><lt>10.0.7,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>10.0.8,1</lt></range>
+ </package>
+ <package>
+ <name>linux-seamonkey</name>
+ <range><lt>2.13</lt></range>
+ </package>
+ <package>
+ <name>linux-thunderbird</name>
+ <range><lt>10.0.8</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <range><lt>2.13</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><gt>11.0</gt><lt>16.0</lt></range>
+ <range><lt>10.0.8</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <range><gt>1.9.2.*</gt><lt>10.0.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Project reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
+ <p> MFSA 2012-74 Miscellaneous memory safety hazards (rv:16.0/
+ rv:10.0.8)</p>
+ <p>MFSA 2012-75 select element persistance allows for attacks</p>
+ <p>MFSA 2012-76 Continued access to initial origin after setting
+ document.domain</p>
+ <p>MFSA 2012-77 Some DOMWindowUtils methods bypass security checks</p>
+ <p>MFSA 2012-78 Reader Mode pages have chrome privileges</p>
+ <p>MFSA 2012-79 DOS and crash with full screen and history navigation</p>
+ <p>MFSA 2012-80 Crash with invalid cast when using instanceof
+ operator</p>
+ <p>MFSA 2012-81 GetProperty function can bypass security checks</p>
+ <p>MFSA 2012-82 top object and location property accessible by
+ plugins</p>
+ <p>MFSA 2012-83 Chrome Object Wrapper (COW) does not disallow acces
+ to privileged functions or properties</p>
+ <p>MFSA 2012-84 Spoofing and script injection through location.hash</p>
+ <p>MFSA 2012-85 Use-after-free, buffer overflow, and out of bounds
+ read issues found using Address Sanitizer</p>
+ <p>MFSA 2012-86 Heap memory corruption issues found using Address
+ Sanitizer</p>
+ <p>MFSA 2012-87 Use-after-free in the IME State Manager</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-3982</cvename>
+ <cvename>CVE-2012-3983</cvename>
+ <cvename>CVE-2012-3984</cvename>
+ <cvename>CVE-2012-3985</cvename>
+ <cvename>CVE-2012-3986</cvename>
+ <cvename>CVE-2012-3987</cvename>
+ <cvename>CVE-2012-3988</cvename>
+ <cvename>CVE-2012-3989</cvename>
+ <cvename>CVE-2012-3990</cvename>
+ <cvename>CVE-2012-3991</cvename>
+ <cvename>CVE-2012-3992</cvename>
+ <cvename>CVE-2012-3993</cvename>
+ <cvename>CVE-2012-3994</cvename>
+ <cvename>CVE-2012-3995</cvename>
+ <cvename>CVE-2012-4179</cvename>
+ <cvename>CVE-2012-4180</cvename>
+ <cvename>CVE-2012-4181</cvename>
+ <cvename>CVE-2012-4182</cvename>
+ <cvename>CVE-2012-4183</cvename>
+ <cvename>CVE-2012-4184</cvename>
+ <cvename>CVE-2012-4186</cvename>
+ <cvename>CVE-2012-4187</cvename>
+ <cvename>CVE-2012-4188</cvename>
+ <url>http://www.mozilla.org/security/known-vulnerabilities/</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-74.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-75.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-76.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-77.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-78.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-79.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-80.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-81.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-82.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-83.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-84.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-85.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-86.html</url>
+ <url>http://www.mozilla.org/security/announce/2012/mfsa2012-87.html</url>
+ </references>
+ <dates>
+ <discovery>2012-10-09</discovery>
+ <entry>2012-10-10</entry>
+ </dates>
+ </vuln>
+
<vuln vid="57a700f9-12c0-11e2-9f86-001d923933b6">
<topic>dns/bind9* -- crash on deliberately constructed combination of records</topic>
<affects>