A race condition in Opera web browser 7.53 Build 3850 causes Opera to fill in the address bar before the page has been loaded, which allows remote attackers to spoof the URL in the address bar via the window.open and location.replace HTML parameters, which facilitates phishing attacks.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html | Broken Link Exploit |
http://secunia.com/advisories/12162 | Broken Link Patch |
http://www.opera.com/windows/changelogs/754/ | Broken Link Patch |
http://www.osvdb.org/8317 | Broken Link Exploit |
http://www.securityfocus.com/bid/10810 | Broken Link Exploit Patch Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16816 | Third Party Advisory VDB Entry |
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html | Broken Link Exploit |
http://secunia.com/advisories/12162 | Broken Link Patch |
http://www.opera.com/windows/changelogs/754/ | Broken Link Patch |
http://www.osvdb.org/8317 | Broken Link Exploit |
http://www.securityfocus.com/bid/10810 | Broken Link Exploit Patch Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16816 | Third Party Advisory VDB Entry |
Configurations
History
20 Nov 2024, 23:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html - Broken Link, Exploit | |
References | () http://secunia.com/advisories/12162 - Broken Link, Patch | |
References | () http://www.opera.com/windows/changelogs/754/ - Broken Link, Patch | |
References | () http://www.osvdb.org/8317 - Broken Link, Exploit | |
References | () http://www.securityfocus.com/bid/10810 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16816 - Third Party Advisory, VDB Entry |
28 Feb 2022, 18:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* | |
References | (FULLDISC) http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html - Broken Link, Exploit | |
References | (CONFIRM) http://www.opera.com/windows/changelogs/754/ - Broken Link, Patch | |
References | (BID) http://www.securityfocus.com/bid/10810 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry | |
References | (OSVDB) http://www.osvdb.org/8317 - Broken Link, Exploit | |
References | (SECUNIA) http://secunia.com/advisories/12162 - Broken Link, Patch | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/16816 - Third Party Advisory, VDB Entry | |
CWE | CWE-362 |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:53
NVD link : CVE-2004-2491
Mitre link : CVE-2004-2491
CVE.ORG link : CVE-2004-2491
JSON object : View
Products Affected
opera
- opera_browser
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')