Vulnerabilities > CVE-2007-3819 - Unspecified vulnerability in Opera Browser 9.21
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN opera
nessus
Summary
Opera 9.21 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200708-17.NASL description The remote host is affected by the vulnerability described in GLSA-200708-17 (Opera: Multiple vulnerabilities) An error known as last seen 2020-06-01 modified 2020-06-02 plugin id 26040 published 2007-09-14 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/26040 title GLSA-200708-17 : Opera: Multiple vulnerabilities NASL family Windows NASL id OPERA_922.NASL description The version of Opera installed on the remote host reportedly can be tricked into attempting to dereference an invalid object pointer when parsing a specially crafted BitTorrent header. This could cause the application to crash or even lead to execution of arbitrary code subject to the privileges of the current user. Successful exploitation requires that a user on the affected host click on a link to a BitTorrent file and then remove the entry from Opera last seen 2020-06-01 modified 2020-06-02 plugin id 25755 published 2007-07-23 reporter This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/25755 title Opera < 9.22 Multiple Vulnerabilities
References
- http://alt.swiecki.net/oper1.html
- http://alt.swiecki.net/oper1.html
- http://osvdb.org/38122
- http://osvdb.org/38122
- http://secunia.com/advisories/26074
- http://secunia.com/advisories/26074
- http://secunia.com/advisories/26545
- http://secunia.com/advisories/26545
- http://security.gentoo.org/glsa/glsa-200708-17.xml
- http://security.gentoo.org/glsa/glsa-200708-17.xml
- http://securityreason.com/securityalert/2891
- http://securityreason.com/securityalert/2891
- http://www.novell.com/linux/security/advisories/2007_15_sr.html
- http://www.novell.com/linux/security/advisories/2007_15_sr.html
- http://www.securityfocus.com/archive/1/473703/100/0/threaded
- http://www.securityfocus.com/archive/1/473703/100/0/threaded
- http://www.securityfocus.com/archive/1/473782/100/0/threaded
- http://www.securityfocus.com/archive/1/473782/100/0/threaded
- http://www.securityfocus.com/bid/24917
- http://www.securityfocus.com/bid/24917
- http://www.securitytracker.com/id?1018397
- http://www.securitytracker.com/id?1018397
- http://www.vupen.com/english/advisories/2007/2537
- http://www.vupen.com/english/advisories/2007/2537
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35430
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35430