summaryrefslogtreecommitdiffstats
path: root/website/DTSA/DTSA-8-2.html
diff options
context:
space:
mode:
authorJoey Hess <joeyh@debian.org>2005-10-19 22:57:32 +0000
committerJoey Hess <joeyh@debian.org>2005-10-19 22:57:32 +0000
commit7f80adf6e6c3a24596af73c5ac1e03fa4c9d2129 (patch)
tree1fcc64ad61167eff165d0351640f02bac28e3cdf /website/DTSA/DTSA-8-2.html
parenta3151f8075f7c8d4570fe04acbbff2810878636e (diff)
update website to use only CVE references
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2459 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'website/DTSA/DTSA-8-2.html')
-rw-r--r--website/DTSA/DTSA-8-2.html50
1 files changed, 25 insertions, 25 deletions
diff --git a/website/DTSA/DTSA-8-2.html b/website/DTSA/DTSA-8-2.html
index 88d4ff4cbf..71fcce7a34 100644
--- a/website/DTSA/DTSA-8-2.html
+++ b/website/DTSA/DTSA-8-2.html
@@ -50,19 +50,19 @@
<dd>No<br></dd>
<dt>CVE:</dt>
<dd>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0718'>CAN-2004-0718</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1937'>CAN-2005-1937</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2260'>CAN-2005-2260</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2261'>CAN-2005-2261</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2262'>CAN-2005-2262</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2263'>CAN-2005-2263</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2264'>CAN-2005-2264</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2265'>CAN-2005-2265</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2266'>CAN-2005-2266</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2267'>CAN-2005-2267</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2268'>CAN-2005-2268</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2269'>CAN-2005-2269</a>
-<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2270'>CAN-2005-2270</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0718'>CVE-2004-0718</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1937'>CVE-2005-1937</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2260'>CVE-2005-2260</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2261'>CVE-2005-2261</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2262'>CVE-2005-2262</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2263'>CVE-2005-2263</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2264'>CVE-2005-2264</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2265'>CVE-2005-2265</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2266'>CVE-2005-2266</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2267'>CVE-2005-2267</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2268'>CVE-2005-2268</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2269'>CVE-2005-2269</a>
+<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2270'>CVE-2005-2270</a>
<br></dd>
<br><dt>More information:</dt>
<dd>We experienced that the update for Mozilla Firefox from DTSA-8-1&nbsp;<br>
@@ -74,65 +74,65 @@ text:&nbsp;<br>
&nbsp;<br>
Several problems were discovered in Mozilla Firefox:&nbsp;<br>
&nbsp;<br>
-CAN-2004-0718 CAN-2005-1937&nbsp;<br>
+CVE-2004-0718 CVE-2005-1937&nbsp;<br>
&nbsp;<br>
A vulnerability has been discovered in Mozilla Firefox that allows remote&nbsp;<br>
attackers to inject arbitrary Javascript from one page into the frameset of&nbsp;<br>
another site.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2260&nbsp;<br>
+CVE-2005-2260&nbsp;<br>
&nbsp;<br>
The browser user interface does not properly distinguish between&nbsp;<br>
user-generated events and untrusted synthetic events, which makes it easier&nbsp;<br>
for remote attackers to perform dangerous actions that normally could only be&nbsp;<br>
performed manually by the user.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2261&nbsp;<br>
+CVE-2005-2261&nbsp;<br>
&nbsp;<br>
XML scripts ran even when Javascript disabled.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2262&nbsp;<br>
+CVE-2005-2262&nbsp;<br>
&nbsp;<br>
The user can be tricked to executing arbitrary JavaScript code by using a&nbsp;<br>
JavaScript URL as wallpaper.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2263&nbsp;<br>
+CVE-2005-2263&nbsp;<br>
&nbsp;<br>
It is possible for a remote attacker to execute a callback function in the&nbsp;<br>
context of another domain (i.e. frame).&nbsp;<br>
&nbsp;<br>
-CAN-2005-2264&nbsp;<br>
+CVE-2005-2264&nbsp;<br>
&nbsp;<br>
By opening a malicious link in the sidebar it is possible for remote&nbsp;<br>
attackers to steal sensitive information.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2265&nbsp;<br>
+CVE-2005-2265&nbsp;<br>
&nbsp;<br>
Missing input sanitising of InstallVersion.compareTo() can cause the&nbsp;<br>
application to crash.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2266&nbsp;<br>
+CVE-2005-2266&nbsp;<br>
&nbsp;<br>
Remote attackers could steal sensitive information such as cookies and&nbsp;<br>
passwords from web sites by accessing data in alien frames.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2267&nbsp;<br>
+CVE-2005-2267&nbsp;<br>
&nbsp;<br>
By using standalone applications such as Flash and QuickTime to open a&nbsp;<br>
javascript: URL, it is possible for a remote attacker to steal sensitive&nbsp;<br>
information and possibly execute arbitrary code.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2268&nbsp;<br>
+CVE-2005-2268&nbsp;<br>
&nbsp;<br>
It is possible for a Javascript dialog box to spoof a dialog box from a&nbsp;<br>
trusted site and facilitates phishing attacks.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2269&nbsp;<br>
+CVE-2005-2269&nbsp;<br>
&nbsp;<br>
Remote attackers could modify certain tag properties of DOM nodes that could&nbsp;<br>
lead to the execution of arbitrary script or code.&nbsp;<br>
&nbsp;<br>
-CAN-2005-2270&nbsp;<br>
+CVE-2005-2270&nbsp;<br>
&nbsp;<br>
The Mozilla browser family does not properly clone base objects, which allows&nbsp;<br>
remote attackers to execute arbitrary code.&nbsp;<br>

© 2014-2024 Faster IT GmbH | imprint | privacy policy