aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2007-08-26 03:36:42 +0800
committersimon <simon@FreeBSD.org>2007-08-26 03:36:42 +0800
commit994db52a1bac6f03ef908819ab57490de11be61f (patch)
treec814ad8b5ffc2f79e1812a0ac630785b3a6b3253 /security
parente5442f9a4a39eaed3e437ccdee11b3da2063daab (diff)
downloadfreebsd-ports-gnome-994db52a1bac6f03ef908819ab57490de11be61f.tar.gz
freebsd-ports-gnome-994db52a1bac6f03ef908819ab57490de11be61f.tar.zst
freebsd-ports-gnome-994db52a1bac6f03ef908819ab57490de11be61f.zip
From latest Opera entry:
- Remove redundant information. - Bump modified date for recent changes to the entry.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml13
1 files changed, 3 insertions, 10 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 427f806dc211..df33f7e030bb 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -79,16 +79,8 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>An advisory from Opera reports:</p>
<blockquote cite="http://www.opera.com/support/search/view/865/">
- <p>A specially crafted JavaScript can make Opera execute arbitrary code.</p>
- <h1>Severity:</h1>
- <p>Highly severe</p>
- <h1>Problem description</h1>
- <p>A virtual function call on an invalid pointer that may reference
- data crafted by the attacker can be used to execute arbitrary code.</p>
- <h1>Opera's response</h1>
- <p>Opera Software has released Opera 9.23, where this issue has been fixed.</p>
- <h1>Credits</h1>
- <p>Thanks to Mozilla.org for providing their JavaScript fuzzer.</p>
+ <p>A specially crafted JavaScript can make Opera execute
+ arbitrary code.</p>
</blockquote>
</body>
</description>
@@ -98,6 +90,7 @@ Note: Please add new entries to the beginning of this file.
<dates>
<discovery>2007-08-03</discovery>
<entry>2007-08-15</entry>
+ <modified>2007-08-25</modified>
</dates>
</vuln>