diff options
author | Dirk Meyer <dinoex@FreeBSD.org> | 2010-10-26 16:46:27 +0000 |
---|---|---|
committer | Dirk Meyer <dinoex@FreeBSD.org> | 2010-10-26 16:46:27 +0000 |
commit | 370de94beb6f13ec5471a3b9b07978248755b90d (patch) | |
tree | 1b22f99c72fb737de1a414ad93c9d8bba6d720d2 /security/vuxml/vuln.xml | |
parent | 8d45e0b15bd8bd0ea237b6a252cb933444bf362d (diff) | |
download | ports-370de94beb6f13ec5471a3b9b07978248755b90d.tar.gz ports-370de94beb6f13ec5471a3b9b07978248755b90d.zip |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 79ddf94b921b..7bd82565abf3 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,47 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="aab187d4-e0f3-11df-b1ea-001999392805"> + <topic>opera -- multiple vulnerabilities</topic> + <affects> + <package> + <name>opera</name> + <range><lt>10.63</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Opera Desktop Team reports:</p> + <blockquote cite="http://www.opera.com/docs/changelogs/unix/1063/"> + <ul> + <li>Fixed an issue that allowed cross-domain checks to be bypassed, + allowing limited data theft using CSS, as reported by Isaac + Dawson.</li> + <li>Fixed an issue where manipulating the window could be used to + spoof the page address.</li> + <li>Fixed an issue with reloads and redirects that could allow + spoofing and cross-site scripting.</li> + <li>Fixed an issue that allowed private video streams to be + intercepted, as reported by Nirankush Panchbhai of Microsoft + Vulnerability Research.</li> + <li>Fixed an issue that caused JavaScript to run in the wrong + security context after manual interaction.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>http://www.opera.com/support/kb/view/971/</url> + <url>http://www.opera.com/support/kb/view/972/</url> + <url>http://www.opera.com/support/kb/view/973/</url> + <url>http://www.opera.com/support/kb/view/974/</url> + <url>http://www.opera.com/support/kb/view/976/</url> + </references> + <dates> + <discovery>2010-10-12</discovery> + <entry>2010-10-26</entry> + </dates> + </vuln> <vuln vid="0ddb57a9-da20-4e99-b048-4366092f3d31"> <topic>bzip2 -- integer overflow vulnerability</topic> <affects> |