Opera before 10.63 does not properly select the security context of JavaScript code associated with an error page, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://securitytracker.com/id?1024570 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12115 | vdb entry signature |
http://www.opera.com/docs/changelogs/mac/1063/ | |
http://www.opera.com/support/kb/view/976/ | vendor advisory |
http://secunia.com/advisories/41740 | third party advisory vendor advisory |
http://www.opera.com/docs/changelogs/unix/1063/ | |
http://www.opera.com/docs/changelogs/windows/1063/ |