Reimport advisories without products.
This commit is contained in:
Родитель
985e259334
Коммит
5c97448ae4
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: Low
|
||||
mfsa_id: 2005-01
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Jesse Ruderman
|
||||
title: Link opened in new tab can load a local file
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: Moderate (on a multiuser computer)
|
||||
mfsa_id: 2005-02
|
||||
products:
|
||||
- Thunderbird
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: danielk
|
||||
title: Opened attachments are temporarily saved world-readable
|
||||
vulnerable:
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: Low
|
||||
mfsa_id: 2005-03
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Kylotan
|
||||
title: Secure site lock can be spoofed with a binary download
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: Low
|
||||
mfsa_id: 2005-04
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Kohei Yoshino
|
||||
title: 'Secure site lock can be spoofed with view-source:'
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: High
|
||||
mfsa_id: 2005-05
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Jakob Balle (Secunia)
|
||||
title: Input stealing from other tabs
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: High
|
||||
mfsa_id: 2005-06
|
||||
products:
|
||||
- Thunderbird
|
||||
- Mozilla Suite
|
||||
reporter: Maurycy Prodeus (iSEC Security Research)
|
||||
title: 'Heap overrun handling malicious news: URL'
|
||||
---
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.0
|
||||
impact: High
|
||||
mfsa_id: 2005-07
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Omar Khan
|
||||
title: Script-generated event can download without prompting
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: Moderate
|
||||
mfsa_id: 2005-08
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Jesse Ruderman
|
||||
title: Synthetic middle-click event can steal clipboard contents
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: High
|
||||
mfsa_id: 2005-09
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Christopher Nebergall
|
||||
title: Browser responds to proxy auth request from non-proxy server (ssl/https)
|
||||
---
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Thunderbird 0.9
|
||||
impact: Moderate to Critical
|
||||
mfsa_id: 2005-10
|
||||
products:
|
||||
- Thunderbird
|
||||
reporter: Tom Braun
|
||||
title: 'javascript: links in Thunderbird launch Internet Explorer'
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: High
|
||||
mfsa_id: 2005-11
|
||||
products:
|
||||
- Thunderbird
|
||||
- Mozilla Suite
|
||||
reporter: Michiel van Leeuwen
|
||||
title: Mail responds to cookie requests
|
||||
vulnerable:
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.0
|
||||
impact: High
|
||||
mfsa_id: 2005-12
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Omar Khan
|
||||
title: 'javascript: Livefeed bookmarks can steal cookies'
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Low
|
||||
mfsa_id: 2005-13
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Secunia
|
||||
risk: Low
|
||||
title: Window Injection Spoofing
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Moderate
|
||||
mfsa_id: 2005-14
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Mook, Doug Turner, Kohei Yoshino, M. Deaudelin
|
||||
risk: Moderate
|
||||
title: SSL "secure site" indicator spoofing
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: High
|
||||
mfsa_id: 2005-15
|
||||
products:
|
||||
- Thunderbird
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: wind li
|
||||
risk: Low
|
||||
title: Heap overflow possible in UTF8 to Unicode conversion
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: High
|
||||
mfsa_id: 2005-16
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Michael Krax
|
||||
risk: Low
|
||||
title: Spoofing download and security dialogs with overlapping windows
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Low
|
||||
mfsa_id: 2005-17
|
||||
products:
|
||||
- Thunderbird
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Phil Ringnalda
|
||||
risk: Low
|
||||
title: Install source spoofing with user:pass@host
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: High
|
||||
mfsa_id: 2005-18
|
||||
products:
|
||||
- Thunderbird
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Daniel de Wildt
|
||||
risk: Low
|
||||
title: Memory overwrite in string library
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.0.1
|
||||
impact: Moderate
|
||||
mfsa_id: 2005-19
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Matt Brubeck
|
||||
risk: Moderate
|
||||
title: Autocomplete data leak
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Low
|
||||
mfsa_id: 2005-20
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Georgi Guninski
|
||||
risk: High
|
||||
title: XSLT can include stylesheets from arbitrary hosts
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Critical
|
||||
mfsa_id: 2005-21
|
||||
products:
|
||||
- Thunderbird
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Masayuki Nakano
|
||||
risk: Low
|
||||
title: Overwrite arbitrary files downloading .lnk twice
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.5
|
||||
impact: Low
|
||||
mfsa_id: 2005-22
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Andreas Sandblad (Secunia)
|
||||
risk: Low
|
||||
title: Download dialog spoofing using Content-Disposition header
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Low
|
||||
mfsa_id: 2005-23
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Jakob Balle (Secunia)
|
||||
risk: Low
|
||||
title: Download dialog source spoofing
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Low
|
||||
mfsa_id: 2005-24
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Christian Schmidt
|
||||
risk: Low
|
||||
title: HTTP auth prompt tab spoofing
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Critical
|
||||
mfsa_id: 2005-25
|
||||
products:
|
||||
- Thunderbird
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Michael Krax
|
||||
risk: Moderate
|
||||
title: Image drag and drop executable spoofing
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Critical
|
||||
mfsa_id: 2005-26
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Michael Krax
|
||||
risk: Low
|
||||
title: 'Cross-site scripting by dropping javascript: link on tab'
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Critical
|
||||
mfsa_id: 2005-27
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Michael Krax
|
||||
risk: Moderate
|
||||
title: Plugins can be used to load privileged content
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Critical (local)
|
||||
mfsa_id: 2005-28
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Tavis Ormandy
|
||||
risk: High (on shared machine, low otherwise)
|
||||
title: Unsafe /tmp/plugtmp directory exploitable to erase user's files
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: High
|
||||
mfsa_id: 2005-29
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Eric Johanson
|
||||
risk: Moderate
|
||||
title: Internationalized Domain Name (IDN) homograph spoofing
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.6
|
||||
impact: Critical
|
||||
mfsa_id: 2005-30
|
||||
products:
|
||||
- Thunderbird
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Mark Dowd (ISS X-Force)
|
||||
risk: High
|
||||
title: GIF heap overflow parsing Netscape extension 2
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.0.2
|
||||
impact: Critical
|
||||
mfsa_id: 2005-31
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Kohei Yoshino
|
||||
risk: Moderate
|
||||
title: Arbitrary code execution from Firefox sidebar panel
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.7
|
||||
impact: Low
|
||||
mfsa_id: 2005-32
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Michael Krax
|
||||
title: Drag and drop loading of privileged XUL
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.7
|
||||
impact: Moderate
|
||||
mfsa_id: 2005-33
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Azafran/Vladimir V. Perepelitsa
|
||||
title: Javascript "lambda" replace exposes memory contents
|
||||
---
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.0.3
|
||||
impact: High
|
||||
mfsa_id: 2005-34
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Omar Khan
|
||||
title: PLUGINSPAGE privileged javascript execution
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.7
|
||||
impact: Moderate
|
||||
mfsa_id: 2005-35
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Doron Rosenberg
|
||||
title: 'Showing blocked javascript: popup uses wrong privilege context'
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.7
|
||||
impact: High
|
||||
mfsa_id: 2005-36
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: shutdown
|
||||
title: Cross-site Scripting through global scope pollution
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.7
|
||||
impact: Critical
|
||||
mfsa_id: 2005-37
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Michael Krax
|
||||
title: 'Code execution through javascript: favicons'
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.7
|
||||
impact: Moderate
|
||||
mfsa_id: 2005-38
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Michael Krax
|
||||
title: Search plugin cross-site scripting
|
||||
---
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.0.3
|
||||
impact: Critical
|
||||
mfsa_id: 2005-39
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Kohei Yoshino
|
||||
title: Arbitrary code execution from Firefox sidebar panel II
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.7
|
||||
impact: Moderate
|
||||
mfsa_id: 2005-40
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Georgi Guninski
|
||||
title: Missing Install object instance checks
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.7
|
||||
impact: Critical
|
||||
mfsa_id: 2005-41
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: moz_bug_r_a4
|
||||
title: Privilege escalation via DOM property overrides
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.8
|
||||
impact: Critical
|
||||
mfsa_id: 2005-42
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Paul (Greyhats)
|
||||
title: 'Code execution via javascript: IconURL'
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.8
|
||||
impact: Critical
|
||||
mfsa_id: 2005-43
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Michael Krax, Georgi Guninski, L. David Baron
|
||||
title: '"Wrapped" javascript: urls bypass security checks'
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.8
|
||||
impact: Critical
|
||||
mfsa_id: 2005-44
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: moz_bug_r_a4
|
||||
title: Privilege escalation via non-DOM property overrides
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.10
|
||||
impact: High
|
||||
mfsa_id: 2005-45
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Omar Khan, Jochen, shutdown, Matthew Mastracci
|
||||
title: Content-generated event vulnerabilities
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.10
|
||||
impact: Low
|
||||
mfsa_id: 2005-46
|
||||
products:
|
||||
- Thunderbird
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: moz_bug_r_a4
|
||||
title: XBL scripts ran even when Javascript disabled
|
||||
---
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.0.5
|
||||
impact: High
|
||||
mfsa_id: 2005-47
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Michael Krax
|
||||
title: Code execution via "Set as Wallpaper"
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.10
|
||||
impact: Low (High for Mozilla Suite)
|
||||
mfsa_id: 2005-48
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Matthew Mastracci
|
||||
title: Same-origin violation with InstallTrigger callback
|
||||
---
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.0.5
|
||||
impact: High
|
||||
mfsa_id: 2005-49
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Kohei Yoshino
|
||||
title: 'Script injection from Firefox sidebar panel using data:'
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.10
|
||||
impact: Critical
|
||||
mfsa_id: 2005-50
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: shutdown
|
||||
title: Exploitable crash in InstallVersion.compareTo
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.10
|
||||
impact: Moderate
|
||||
mfsa_id: 2005-51
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Secunia.com
|
||||
title: The return of frame-injection spoofing
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.10
|
||||
impact: Moderate
|
||||
mfsa_id: 2005-52
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Andreas Sandblad (Secunia)
|
||||
title: 'Same origin violation: frame calling top.focus()'
|
||||
---
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.0.5
|
||||
impact: Critical
|
||||
mfsa_id: 2005-53
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Michael Krax
|
||||
title: Standalone applications can run arbitrary code through the browser
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.10
|
||||
impact: Low
|
||||
mfsa_id: 2005-54
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Secunia.com
|
||||
title: Javascript prompt origin spoofing
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.10
|
||||
impact: High
|
||||
mfsa_id: 2005-55
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: moz_bug_r_a4
|
||||
title: XHTML node spoofing
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.10
|
||||
impact: Critical
|
||||
mfsa_id: 2005-56
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: moz_bug_r_a4, shutdown
|
||||
title: Code execution through shared function objects
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.12
|
||||
impact: Critical
|
||||
mfsa_id: 2005-57
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Tom Ferris
|
||||
title: <abbr title="Internationalized Domain Name">IDN</abbr> heap overrun using soft-hyphensheap
|
||||
overrun using soft-hyphens
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.12
|
||||
impact: Critical
|
||||
mfsa_id: 2005-58
|
||||
products:
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
title: Firefox 1.0.7 / Mozilla Suite 1.7.12 Vulnerability Fixes
|
||||
---
|
||||
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.12
|
||||
impact: Severe
|
||||
mfsa_id: 2005-59
|
||||
products:
|
||||
- Thunderbird
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Peter Zelezny
|
||||
title: Command-line handling on Linux allows shell execution
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Moderate
|
||||
mfsa_id: 2006-01
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Igor Bukanov
|
||||
title: JavaScript garbage-collection hazards
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Thunderbird 1.5.0.2
|
||||
impact: Moderate
|
||||
mfsa_id: 2006-02
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Martijn Wargers
|
||||
title: Changing position:relative to static corrupts memory
|
||||
---
|
||||
|
|
|
@ -7,10 +7,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Low
|
||||
mfsa_id: 2006-03
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: ZIPLOCK
|
||||
title: Long document title causes startup denial of service
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Thunderbird 1.5.0.2
|
||||
impact: Critical
|
||||
mfsa_id: 2006-04
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Georgi Guninski
|
||||
title: Memory corruption via QueryInterface on Location, Navigator objects
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-05
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: moz_bug_r_a4
|
||||
title: Localstore.rdf XML injection through XULDocument.persist()
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Thunderbird 1.5.0.2
|
||||
impact: Moderate
|
||||
mfsa_id: 2006-06
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Georgi Guninski
|
||||
title: Integer overflows in E4X, SVG, and Canvas
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Thunderbird 1.5.0.2
|
||||
impact: Low
|
||||
mfsa_id: 2006-07
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Johnny Stenback
|
||||
title: Read beyond buffer while parsing XML
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- Thunderbird 1.5.0.2
|
||||
impact: Low
|
||||
mfsa_id: 2006-08
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Brendan Eich
|
||||
title: '"AnyName" entrainment and access control hazard'
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0
|
||||
impact: High
|
||||
mfsa_id: 2006-09
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: shutdown
|
||||
title: Cross-site JavaScript injection using event handlers
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-10
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Igor Bukanov
|
||||
title: JavaScript garbage-collection hazard audit
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-11
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: various
|
||||
title: Crashes with evidence of memory corruption (rv:1.8)
|
||||
---
|
||||
|
|
|
@ -7,10 +7,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Low
|
||||
mfsa_id: 2006-12
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Tristor
|
||||
title: Secure-site spoof (requires security warning dialog)
|
||||
---
|
||||
|
|
|
@ -7,10 +7,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Moderate
|
||||
mfsa_id: 2006-13
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Michael Krax
|
||||
title: Downloading executables with "Save Image As..."
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-14
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: shutdown
|
||||
title: Privilege escalation via XBL.method.eval
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-15
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: shutdown
|
||||
title: Privilege escalation using a JavaScript function's cloned parent
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-16
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: moz_bug_r_a4
|
||||
title: Accessing XBL compilation scope via valueOf.call()
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: High
|
||||
mfsa_id: 2006-17
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: shutdown
|
||||
title: cross-site scripting through window.controllers
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-18
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: TippingPoint and the Zero Day Initiative
|
||||
title: Mozilla Firefox Tag Order Vulnerability
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: High
|
||||
mfsa_id: 2006-19
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: moz_bug_r_a4
|
||||
title: Cross-site scripting using .valueOf.call()
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.1
|
||||
impact: Critical
|
||||
mfsa_id: 2006-20
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: various
|
||||
title: Crashes with evidence of memory corruption (rv:1.8.0.2)
|
||||
---
|
||||
|
|
|
@ -7,10 +7,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-21
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Thunderbird
|
||||
- Mozilla Suite
|
||||
reporter: Georgi Guninski
|
||||
title: JavaScript execution in mail when forwarding in-line
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-22
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: TippingPoint and the Zero Day Initiative
|
||||
title: CSS Letter-Spacing Heap Overflow Vulnerability
|
||||
---
|
||||
|
|
|
@ -7,10 +7,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: High
|
||||
mfsa_id: 2006-23
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: "Claus J\xF6rgensen"
|
||||
title: File stealing by changing input type
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-24
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: shutdown
|
||||
title: Privilege escalation using crypto.generateCRMFRequest
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-25
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: Georgi Guninski
|
||||
title: Privilege escalation through Print Preview
|
||||
---
|
||||
|
|
|
@ -5,8 +5,6 @@ fixed_in:
|
|||
- Thunderbird 1.0.8
|
||||
impact: Low
|
||||
mfsa_id: 2006-26
|
||||
products:
|
||||
- Thunderbird
|
||||
reporter: CrashFr
|
||||
title: Mail Multiple Information Disclosure
|
||||
---
|
||||
|
|
|
@ -9,11 +9,6 @@ fixed_in:
|
|||
- Mozilla Suite 1.7.13
|
||||
impact: Critical
|
||||
mfsa_id: 2006-27
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
- Mozilla Suite
|
||||
reporter: TippingPoint and the Zero Day Initiative
|
||||
title: Table Rebuilding Code Execution Vulnerability
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.1
|
||||
impact: Critical
|
||||
mfsa_id: 2006-28
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: shutdown
|
||||
title: Security check of js_ValueToFunctionObject() can be circumvented
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.1
|
||||
impact: Moderate
|
||||
mfsa_id: 2006-29
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: moz_bug_r_a4
|
||||
title: Spoofing with translucent windows
|
||||
---
|
||||
|
|
|
@ -5,8 +5,6 @@ fixed_in:
|
|||
- Firefox 1.5.0.3
|
||||
impact: Critical
|
||||
mfsa_id: 2006-30
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Martijn Wargers, Nick Mott, splices
|
||||
title: Deleted object reference when designMode="on"
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: Moderate
|
||||
mfsa_id: 2006-31
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: moz_bug_r_a4
|
||||
title: EvalInSandbox escape (Proxy Autoconfig, Greasemonkey)
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: Critical
|
||||
mfsa_id: 2006-32
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Mozilla Developers
|
||||
title: Fixes for crashes with potential memory corruption (rv:1.8.0.4)
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: High
|
||||
mfsa_id: 2006-33
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Kazuho Oku (Cybozu Labs)
|
||||
title: HTTP response smuggling
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: Moderate
|
||||
mfsa_id: 2006-34
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Paul Nickerson
|
||||
title: 'XSS viewing javascript: frames or images from context menu'
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: Critical
|
||||
mfsa_id: 2006-35
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Jonas Sicking (Mozilla)
|
||||
title: Privilege escalation through XUL persist.
|
||||
---
|
||||
|
|
|
@ -4,8 +4,6 @@ fixed_in:
|
|||
- Firefox 1.5.0.4
|
||||
impact: Moderate
|
||||
mfsa_id: 2006-36
|
||||
products:
|
||||
- Firefox
|
||||
reporter: Paul Nickerson
|
||||
title: PLUGINSPAGE privileged JavaScript execution II
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: Critical
|
||||
mfsa_id: 2006-37
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Paul Nickerson, moz_bug_r_a4
|
||||
title: Remote compromise via content-defined setter on object prototypes
|
||||
---
|
||||
|
|
|
@ -6,10 +6,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: Critical
|
||||
mfsa_id: 2006-38
|
||||
products:
|
||||
- Thunderbird
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Mikolaj J. Habryn
|
||||
title: Buffer overflow in crypto.signText()
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: Low
|
||||
mfsa_id: 2006-39
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Eric Foley
|
||||
title: '"View Image" local resource linking (Windows)'
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: Critical
|
||||
mfsa_id: 2006-40
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Thunderbird
|
||||
reporter: Masatoshi Kimura
|
||||
title: Double-free on malformed VCard
|
||||
---
|
||||
|
|
|
@ -5,9 +5,6 @@ fixed_in:
|
|||
- SeaMonkey 1.0.2
|
||||
impact: High
|
||||
mfsa_id: 2006-41
|
||||
products:
|
||||
- SeaMonkey
|
||||
- Firefox
|
||||
reporter: Chuck McAuley
|
||||
title: File stealing by changing input type (variant)
|
||||
---
|
||||
|
|
Некоторые файлы не были показаны из-за слишком большого количества измененных файлов Показать больше
Загрузка…
Ссылка в новой задаче