diff options
author | Joey Hess <joeyh@debian.org> | 2005-10-19 22:57:32 +0000 |
---|---|---|
committer | Joey Hess <joeyh@debian.org> | 2005-10-19 22:57:32 +0000 |
commit | 7f80adf6e6c3a24596af73c5ac1e03fa4c9d2129 (patch) | |
tree | 1fcc64ad61167eff165d0351640f02bac28e3cdf /website/DTSA/DTSA-8-2.html | |
parent | a3151f8075f7c8d4570fe04acbbff2810878636e (diff) |
update website to use only CVE references
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@2459 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'website/DTSA/DTSA-8-2.html')
-rw-r--r-- | website/DTSA/DTSA-8-2.html | 50 |
1 files changed, 25 insertions, 25 deletions
diff --git a/website/DTSA/DTSA-8-2.html b/website/DTSA/DTSA-8-2.html index 88d4ff4cbf..71fcce7a34 100644 --- a/website/DTSA/DTSA-8-2.html +++ b/website/DTSA/DTSA-8-2.html @@ -50,19 +50,19 @@ <dd>No<br></dd> <dt>CVE:</dt> <dd> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0718'>CAN-2004-0718</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1937'>CAN-2005-1937</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2260'>CAN-2005-2260</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2261'>CAN-2005-2261</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2262'>CAN-2005-2262</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2263'>CAN-2005-2263</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2264'>CAN-2005-2264</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2265'>CAN-2005-2265</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2266'>CAN-2005-2266</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2267'>CAN-2005-2267</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2268'>CAN-2005-2268</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2269'>CAN-2005-2269</a> -<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2270'>CAN-2005-2270</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0718'>CVE-2004-0718</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1937'>CVE-2005-1937</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2260'>CVE-2005-2260</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2261'>CVE-2005-2261</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2262'>CVE-2005-2262</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2263'>CVE-2005-2263</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2264'>CVE-2005-2264</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2265'>CVE-2005-2265</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2266'>CVE-2005-2266</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2267'>CVE-2005-2267</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2268'>CVE-2005-2268</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2269'>CVE-2005-2269</a> +<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2270'>CVE-2005-2270</a> <br></dd> <br><dt>More information:</dt> <dd>We experienced that the update for Mozilla Firefox from DTSA-8-1 <br> @@ -74,65 +74,65 @@ text: <br> <br> Several problems were discovered in Mozilla Firefox: <br> <br> -CAN-2004-0718 CAN-2005-1937 <br> +CVE-2004-0718 CVE-2005-1937 <br> <br> A vulnerability has been discovered in Mozilla Firefox that allows remote <br> attackers to inject arbitrary Javascript from one page into the frameset of <br> another site. <br> <br> -CAN-2005-2260 <br> +CVE-2005-2260 <br> <br> The browser user interface does not properly distinguish between <br> user-generated events and untrusted synthetic events, which makes it easier <br> for remote attackers to perform dangerous actions that normally could only be <br> performed manually by the user. <br> <br> -CAN-2005-2261 <br> +CVE-2005-2261 <br> <br> XML scripts ran even when Javascript disabled. <br> <br> -CAN-2005-2262 <br> +CVE-2005-2262 <br> <br> The user can be tricked to executing arbitrary JavaScript code by using a <br> JavaScript URL as wallpaper. <br> <br> -CAN-2005-2263 <br> +CVE-2005-2263 <br> <br> It is possible for a remote attacker to execute a callback function in the <br> context of another domain (i.e. frame). <br> <br> -CAN-2005-2264 <br> +CVE-2005-2264 <br> <br> By opening a malicious link in the sidebar it is possible for remote <br> attackers to steal sensitive information. <br> <br> -CAN-2005-2265 <br> +CVE-2005-2265 <br> <br> Missing input sanitising of InstallVersion.compareTo() can cause the <br> application to crash. <br> <br> -CAN-2005-2266 <br> +CVE-2005-2266 <br> <br> Remote attackers could steal sensitive information such as cookies and <br> passwords from web sites by accessing data in alien frames. <br> <br> -CAN-2005-2267 <br> +CVE-2005-2267 <br> <br> By using standalone applications such as Flash and QuickTime to open a <br> javascript: URL, it is possible for a remote attacker to steal sensitive <br> information and possibly execute arbitrary code. <br> <br> -CAN-2005-2268 <br> +CVE-2005-2268 <br> <br> It is possible for a Javascript dialog box to spoof a dialog box from a <br> trusted site and facilitates phishing attacks. <br> <br> -CAN-2005-2269 <br> +CVE-2005-2269 <br> <br> Remote attackers could modify certain tag properties of DOM nodes that could <br> lead to the execution of arbitrary script or code. <br> <br> -CAN-2005-2270 <br> +CVE-2005-2270 <br> <br> The Mozilla browser family does not properly clone base objects, which allows <br> remote attackers to execute arbitrary code. <br> |