843a161d8f
- stability fixes - security fixes - MFSA 2006-27 Table Rebuilding Code Execution Vulnerability - MFSA 2006-25 Privilege escalation through Print Preview - MFSA 2006-24 Privilege escalation using crypto.generateCRMFRequest - MFSA 2006-23 File stealing by changing input type - MFSA 2006-22 CSS Letter-Spacing Heap Overflow Vulnerability - MFSA 2006-21 JavaScript execution in mail when forwarding in-line - MFSA 2006-19 Cross-site scripting using .valueOf.call() - MFSA 2006-18 Mozilla Firefox Tag Order Vulnerability - MFSA 2006-17 cross-site scripting through window.controllers - MFSA 2006-16 Accessing XBL compilation scope via valueOf.call() - MFSA 2006-15 Privilege escalation using a JavaScript function's cloned parent - MFSA 2006-14 Privilege escalation via XBL.method.eval - MFSA 2006-13 Downloading executables with "Save Image As..." - MFSA 2006-12 Secure-site spoof (requires security warning dialog) - MFSA 2006-11 Crashes with evidence of memory corruption (rv:1.8) - MFSA 2006-10 JavaScript garbage-collection hazard audit - MFSA 2006-09 Cross-site JavaScript injection using event handlers - MFSA 2006-05 Localstore.rdf XML injection through XULDocument.persist() - MFSA 2006-03 Long document title causes startup denial of Service - MFSA 2006-01 JavaScript garbage-collection hazards
5 lines
303 B
Text
5 lines
303 B
Text
$NetBSD: distinfo,v 1.18 2006/04/22 13:16:28 tron Exp $
|
|
|
|
SHA1 (mozilla-i686-pc-linux-gnu-1.7.13.tar.gz) = 04110560f02e399168b96b6033da1fe299601a97
|
|
RMD160 (mozilla-i686-pc-linux-gnu-1.7.13.tar.gz) = 6e32dede290ad30346623b948556e480d2752b48
|
|
Size (mozilla-i686-pc-linux-gnu-1.7.13.tar.gz) = 13901637 bytes
|