aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2005-11-30 20:55:36 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2005-11-30 20:55:36 +0000
commit0e1765d248a0c3d55363b2c7e7d9bb8562271adf (patch)
tree884f4ea66c5605df17e9e10d199462742feca0f7 /security/vuxml/vuln.xml
parentfa0fa3a3647e214fefa97dd4d0654105ccdcc112 (diff)
downloadports-0e1765d248a0c3d55363b2c7e7d9bb8562271adf.tar.gz
ports-0e1765d248a0c3d55363b2c7e7d9bb8562271adf.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml50
1 files changed, 50 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 60f66c1777d6..c57264f01aa5 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,56 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d6b092bd-61e1-11da-b64c-0001020eed82">
+ <topic>opera -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>linux-opera</name>
+ <name>opera-devel</name>
+ <name>opera</name>
+ <range><lt>8.51</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Opera reports:</p>
+ <blockquote cite="http://www.opera.com/support/search/supsearch.dml?index=819">
+ <p>It is possible to make a form input that looks like an
+ image link. If the form input has a "title" attribute, the
+ status bar will show the "title". A "title" which looks
+ like a URL can mislead the user, since the title can say
+ http://nice.familiar.com/, while the form action can be
+ something else.</p>
+ <p>Opera's tooltip says "Title:" before the title text,
+ making a spoof URL less convincing. A user who has enabled
+ the status bar and disabled tooltips can be affected by
+ this. Neither of these settings are Opera's defaults.</p>
+ <p>This exploit is mostly of interest to users who disable
+ JavaScript. If JavaScript is enabled, any link target or
+ form action can be overridden by the script. The tooltip
+ and the statusbar can only be trusted to show the true
+ location if JavaScript is disabled.</p>
+ </blockquote>
+ <blockquote cite="http://www.opera.com/support/search/supsearch.dml?index=817">
+ <p>Java code using LiveConnect methods to remove a property
+ of a JavaScript object may in some cases use null pointers
+ that can make Opera crash. This crash is not exploitable
+ and such code is rare on the web.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2005-3699</cvename>
+ <url>http://secunia.com/advisories/17571/</url>
+ <url>http://www.opera.com/support/search/supsearch.dml?index=817</url>
+ <url>http://www.opera.com/support/search/supsearch.dml?index=819</url>
+ </references>
+ <dates>
+ <discovery>2005-11-16</discovery>
+ <entry>2005-11-30</entry>
+ </dates>
+ </vuln>
+
<vuln vid="dfc1daa8-61de-11da-b64c-0001020eed82">
<topic>opera -- command line URL shell command injection</topic>
<affects>