View | Details | Raw Unified | Return to bug 140101 | Differences between
and this patch

Collapse All | Expand All

(-)vuxml/vuln.xml (+34 lines)
Lines 35-40 Link Here
35
-->
35
-->
36
36
37
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
37
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
38
  <vuln vid="2fda6bd2-c53c-11de-b157-001999392805">
39
    <topic>opera -- multiple vulnerabilities</topic>
40
    <affects>
41
      <package>
42
        <name>opera</name>
43
        <range><lt>10.01.20091019</lt></range>
44
      </package>
45
      <package>
46
        <name>linux-opera</name>
47
        <range><lt>10.01</lt></range>
48
      </package>
49
    </affects>
50
    <description>
51
      <body xmlns="http://www.w3.org/1999/xhtml">
52
        <p>Opera Team Reports:</p>
53
        <blockquote cite="http://www.opera.com/docs/changelogs/unix/1001/">
54
          <ul>
55
            <li>Fixed an issue where certain domain names could allow execution of arbitrary code, as reported by Chris Weber of Casaba Security</li>
56
            <li>Fixed an issue where scripts can run on the feed subscription page, as reported by Inferno</li>
57
          </ul>
58
        </blockquote>
59
      </body>
60
    </description>
61
    <references>
62
      <url>http://www.opera.com/support/kb/view/938/</url>
63
      <url>http://www.opera.com/support/kb/view/939/</url>
64
    </references>
65
    <dates>
66
      <discovery>2009-10-28</discovery>
67
      <entry>2009-10-30</entry>
68
      <modified>2009-10-30</modified>
69
    </dates>
70
   </vuln>
71
38
  <vuln vid="83d7d149-b965-11de-a515-0022156e8794">
72
  <vuln vid="83d7d149-b965-11de-a515-0022156e8794">
39
    <topic>Enhanced cTorrent -- stack-based overflow</topic>
73
    <topic>Enhanced cTorrent -- stack-based overflow</topic>
40
    <affects>
74
    <affects>

Return to bug 140101