aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorIon-Mihai Tetcu <itetcu@FreeBSD.org>2007-08-15 12:15:39 +0000
committerIon-Mihai Tetcu <itetcu@FreeBSD.org>2007-08-15 12:15:39 +0000
commit3eebdacd1cdaafe04e1f6b36836885bf52baefe7 (patch)
treec5750f2d1ee1a4272db206a6e51606d47e9c1724 /security
parent84ef78913b51eb0df271c8852025a45b47f9d00a (diff)
downloadports-3eebdacd1cdaafe04e1f6b36836885bf52baefe7.tar.gz
ports-3eebdacd1cdaafe04e1f6b36836885bf52baefe7.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 07beb0dd9e92..85f4f7c1dbe4 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,40 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="df4a7d21-4b17-11dc-9fc2-001372ae3ab9">
+ <topic>opera -- Vulnerability in javascript handling</topic>
+ <affects>
+ <package>
+ <name>opera</name>
+ <range><lt>9.23.20070809</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>An advisory from Opera reports:</p>
+ <blockquote cite="http://www.opera.com/support/search/view/865/">
+ <p>A specially crafted JavaScript can make Opera execute arbitrary code.</p>
+ <h1>Severity:</h1>
+ <p>Highly severe</p>
+ <h1>Problem description</h1>
+ <p>A virtual function call on an invalid pointer that may reference
+ data crafted by the attacker can be used to execute arbitrary code.</p>
+ <h1>Opera's response</h1>
+ <p>Opera Software has released Opera 9.23, where this issue has been fixed.</p>
+ <h1>Credits</h1>
+ <p>Thanks to Mozilla.org for providing their JavaScript fuzzer.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.opera.com/support/search/view/865/</url>
+ </references>
+ <dates>
+ <discovery>2007-08-03</discovery>
+ <entry>2007-08-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4a338d17-412d-11dc-bdb0-0016179b2dd5">
<topic>fsplib -- multiple vulnerabilities</topic>
<affects>