f724bacbb3
- stability fixes - security fixes - MFSA 2006-27 Table Rebuilding Code Execution Vulnerability - MFSA 2006-25 Privilege escalation through Print Preview - MFSA 2006-24 Privilege escalation using crypto.generateCRMFRequest - MFSA 2006-23 File stealing by changing input type - MFSA 2006-22 CSS Letter-Spacing Heap Overflow Vulnerability - MFSA 2006-21 JavaScript execution in mail when forwarding in-line - MFSA 2006-19 Cross-site scripting using .valueOf.call() - MFSA 2006-18 Mozilla Firefox Tag Order Vulnerability - MFSA 2006-17 cross-site scripting through window.controllers - MFSA 2006-16 Accessing XBL compilation scope via valueOf.call() - MFSA 2006-15 Privilege escalation using a JavaScript function's cloned parent - MFSA 2006-14 Privilege escalation via XBL.method.eval - MFSA 2006-13 Downloading executables with "Save Image As..." - MFSA 2006-12 Secure-site spoof (requires security warning dialog) - MFSA 2006-11 Crashes with evidence of memory corruption (rv:1.8) - MFSA 2006-10 JavaScript garbage-collection hazard audit - MFSA 2006-09 Cross-site JavaScript injection using event handlers - MFSA 2006-05 Localstore.rdf XML injection through XULDocument.persist() - MFSA 2006-03 Long document title causes startup denial of Service - MFSA 2006-01 JavaScript garbage-collection hazards - additional patch to fix pr#33333 Shin'ichiro TAYA told me that i can do this update. |
||
---|---|---|
.. | ||
patch-aa | ||
patch-ab | ||
patch-ac | ||
patch-ad | ||
patch-ae | ||
patch-af | ||
patch-ag | ||
patch-ah | ||
patch-ai | ||
patch-aj | ||
patch-ak | ||
patch-al | ||
patch-an | ||
patch-ao | ||
patch-ap | ||
patch-aq | ||
patch-aw | ||
patch-ax | ||
patch-ba | ||
patch-bb | ||
patch-bm | ||
patch-bo | ||
patch-bq | ||
patch-br | ||
patch-bs | ||
patch-bt | ||
patch-bu | ||
patch-bv | ||
patch-bw | ||
patch-bx | ||
patch-by | ||
patch-bz | ||
patch-ca | ||
patch-cb | ||
patch-cc | ||
patch-cg | ||
patch-ch | ||
patch-ci | ||
patch-cj | ||
patch-ck | ||
patch-cl | ||
patch-cm | ||
patch-cn |