Two vulnerabilities have been reported in Slim Browser, which can be exploited by malicious web sites to obtain sensitive information and spoof dialog boxes.

1) Inactive tabs can launch dialog boxes so they appear to be displayed by a web site in another tab. This can be exploited by a malicious web site to show a dialog box, which seems to originate from a trusted web site.

Successful exploitation would normally require that a user is tricked into opening a link from a malicious web site to a trusted web site in a new tab.

A test is available here:
http://secunia.com/multiple_browsers_dialog_box_spoofing_test/

2) Inactive tabs can gain focus from form fields on web sites in another tab. This can potentially be exploited to collect sensitive data entered in form fields on other web sites.

Successful exploitation would normally require that a user is tricked into opening a link from a malicious web site to a trusted web site in a new tab.

A test is available here:
http://secunia.com/multiple_browsers_form_field_focus_test/

The vulnerabilities have been confirmed in Slim Browser 4.01 Build 003. Other versions may also be vulnerable.

Solution: Don't visit trusted web sites while visiting untrusted web sites or disable JavaScript.

http://secunia.com/advisories/12983/