FreeBSD Bugzilla – Attachment 81936 Details for
Bug 117268
Update www/opera to version 9.24
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
file.diff
file.diff (text/plain), 2.79 KB, created by
Arjan van Leeuwen
on 2007-10-17 13:20:02 UTC
(
hide
)
Description:
file.diff
Filename:
MIME Type:
Creator:
Arjan van Leeuwen
Created:
2007-10-17 13:20:02 UTC
Size:
2.79 KB
patch
obsolete
>--- vuln.xml.orig 2007-10-17 13:47:43.000000000 +0200 >+++ vuln.xml 2007-10-17 13:58:26.000000000 +0200 >@@ -34,6 +34,67 @@ > > --> > <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> >+ <vuln vid="24d8cb68-7ca8-11dc-bcc3-001372ae3ab9"> >+ <topic>opera -- Scripts can overwrite functions on pages from other domains</topic> >+ <affects> >+ <package> >+ <name>opera</name> >+ <name>opera-devel</name> >+ <name>linux-opera</name> >+ <range><lt>9.24.20071015</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <p>An advisory from Opera reports:</p> >+ <blockquote cite="http://www.opera.com/support/search/view/867/"> >+ <p>Scripts can overwrite functions on pages from other domains.</p> >+ <p>When accesing frames from different Web sites, specially crafted scripts >+ can bypass the same-origin policy, and overwrite functions from those frames. >+ If scripts on the page then run those functions, this can cause the script of >+ the attacker's choice to run in the context of the target Web site.</p> >+ </blockquote> >+ </body> >+ </description> >+ <references> >+ <url>http://www.opera.com/support/search/view/867/</url> >+ </references> >+ <dates> >+ <discovery>2007-10-15</discovery> >+ <entry>2007-10-17</entry> >+ </dates> >+ </vuln> >+ >+ <vuln vid="195703eb-7ca8-11dc-bcc3-001372ae3ab9"> >+ <topic>opera -- external news readers and e-mail clients can be used to execute arbitrary code</topic> >+ <affects> >+ <package> >+ <name>opera</name> >+ <name>opera-devel</name> >+ <name>linux-opera</name> >+ <range><lt>9.24.20071015</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <p>An advisory from Opera reports:</p> >+ <blockquote cite="http://www.opera.com/support/search/view/866/"> >+ <p>External news readers and e-mail clients can be used to execute arbitrary code.</p> >+ <p>If a user has configured Opera to use an external newsgroup client or e-mail >+ application, specially crafted Web pages can cause Opera to run that application >+ incorrectly. In some cases this can lead to execution of arbitrary code.</p> >+ </blockquote> >+ </body> >+ </description> >+ <references> >+ <url>http://www.opera.com/support/search/view/866/</url> >+ </references> >+ <dates> >+ <discovery>2007-10-15</discovery> >+ <entry>2007-10-17</entry> >+ </dates> >+ </vuln> >+ > <vuln vid="51b51d4a-7c0f-11dc-9e47-0011d861d5e2"> > <topic>phpmyadmin -- cross-site scripting vulnerability</topic> > <affects> >--- vuln.xml.diff ends here ---
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 117268
:
81935
| 81936