Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Opera Web Script Execution Vulnerabilities - June09 (Windows)

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

This host has Opera browser installed and is prone to Web Script Execution vulnerabilities.

Insight

Insight

- Error in processing a '3xx' HTTP CONNECT response before a successful SSL handshake, which can be exploited by modifying the CONNECT response to specify a 302 redirect to an arbitrary https web site. - Error exists while the HTTP Host header to determine the context of a document provided in a '4xx' or '5xx' CONNECT response from a proxy server, which can be exploited by modifying this CONNECT response, aka an 'SSL tampering' attack. - Displays a cached certificate for a '4xx' or '5xx' CONNECT response page returned by a proxy server, which can be exploited by sending the browser a crafted 502 response page upon a subsequent request. - Detects http content in https web pages only when the top-level frame uses https. This can be exploited by modifying an http page to include an https iframe that references a script file on an http site, related to 'HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages.'

Affected Software

Affected Software

Opera version prior to 9.25 on Windows.

Common Vulnerabilities and Exposures (CVE)