Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1361

Опубликовано: 12 окт. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2012-1361: xulrunner security update (CRITICAL)

[10.0.8-2.0.1.el6_3]

  • Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js

[10.0.8-2]

  • Added patches from 10.0.9 ESR

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

xulrunner

10.0.8-2.0.1.el5_8

xulrunner-devel

10.0.8-2.0.1.el5_8

Oracle Linux x86_64

xulrunner

10.0.8-2.0.1.el5_8

xulrunner-devel

10.0.8-2.0.1.el5_8

Oracle Linux i386

xulrunner

10.0.8-2.0.1.el5_8

xulrunner-devel

10.0.8-2.0.1.el5_8

Oracle Linux 6

Oracle Linux x86_64

xulrunner

10.0.8-2.0.1.el6_3

xulrunner-devel

10.0.8-2.0.1.el6_3

Oracle Linux i686

xulrunner

10.0.8-2.0.1.el6_3

xulrunner-devel

10.0.8-2.0.1.el6_3

Связанные CVE

Связанные уязвимости

ubuntu
почти 13 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.

redhat
почти 13 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.

nvd
почти 13 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.

debian
почти 13 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunder ...

github
больше 3 лет назад

Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.