aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorMartin Wilke <miwi@FreeBSD.org>2008-10-10 10:00:19 +0000
committerMartin Wilke <miwi@FreeBSD.org>2008-10-10 10:00:19 +0000
commitfc9e7e3d0b2f4f73cce3f0fad2981cc458e87d05 (patch)
tree8d4a50a3c3fa0af276db94590148a3b352d0466e /security/vuxml/vuln.xml
parenta6da45ea56c756f7fb5c21ff5b818ef81149c5bf (diff)
downloadports-fc9e7e3d0b2f4f73cce3f0fad2981cc458e87d05.tar.gz
ports-fc9e7e3d0b2f4f73cce3f0fad2981cc458e87d05.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml72
1 files changed, 36 insertions, 36 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c8fa3a5b9776..c4fe1c2d4338 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,42 +34,42 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
- <vuln vid="fb84d5dd-9528-11dd-9a00-001999392805">
- <topic>opera -- multiple vulnerabilities</topic>
- <affects>
- <package>
- <name>opera</name>
- <range><lt>9.60.20081004</lt></range>
- </package>
- </affects>
- <description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <p>Opera reports:</p>
- <blockquote cite="http://www.opera.com/support/search/view/901/">
- <p>If a malicious page redirects Opera to a specially crafted
- address (URL), it can cause Opera to crash. Given sufficient
- address content, the crash could cause execution of code
- controlled by the attacking page.</p>
- </blockquote>
- <blockquote cite="http://www.opera.com/support/search/view/902/">
- <p>Once a Java applet has been cached, if a page can predict the
- cache path for that applet, it can load the applet from the
- cache, causing it to run in the context of the local machine.
- This allows it to read other cache files on the computer or
- perform other normally more restrictive actions. These files
- could contain sensitive information, which could then be sent
- to the attacker.</p>
- </blockquote>
- </body>
- </description>
- <references>
- <url>http://www.opera.com/support/search/view/901/</url>
- <url>http://www.opera.com/support/search/view/902/</url>
- </references>
- <dates>
- <discovery>2008-10-04</discovery>
- <entry>2008-10-08</entry>
- </dates>
+ <vuln vid="fb84d5dd-9528-11dd-9a00-001999392805">
+ <topic>opera -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>opera</name>
+ <range><lt>9.60.20081004</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Opera reports:</p>
+ <blockquote cite="http://www.opera.com/support/search/view/901/">
+ <p>If a malicious page redirects Opera to a specially crafted
+ address (URL), it can cause Opera to crash. Given sufficient
+ address content, the crash could cause execution of code
+ controlled by the attacking page.</p>
+ </blockquote>
+ <blockquote cite="http://www.opera.com/support/search/view/902/">
+ <p>Once a Java applet has been cached, if a page can predict the
+ cache path for that applet, it can load the applet from the
+ cache, causing it to run in the context of the local machine.
+ This allows it to read other cache files on the computer or
+ perform other normally more restrictive actions. These files
+ could contain sensitive information, which could then be sent
+ to the attacker.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.opera.com/support/search/view/901/</url>
+ <url>http://www.opera.com/support/search/view/902/</url>
+ </references>
+ <dates>
+ <discovery>2008-10-04</discovery>
+ <entry>2008-10-10</entry>
+ </dates>
</vuln>
<vuln vid="4775c807-8f30-11dd-821f-001cc0377035">