Safari version 2.0 (412) does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
Link | Tags |
---|---|
http://secunia.com/advisories/17813 | third party advisory |
http://www.vupen.com/english/advisories/2005/2659 | vdb entry |
http://www.osvdb.org/17397 | vdb entry |
http://securitytracker.com/id?1015294 | vdb entry |
http://docs.info.apple.com/article.html?artnum=302847 | vendor advisory |
http://secunia.com/advisories/15474 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21070 | vdb entry |
http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/ | exploit |
http://secunia.com/secunia_research/2005-12/advisory/ | exploit vendor advisory |
http://www.securityfocus.com/bid/14011 | vdb entry |