CVE-2004-2570

Opera before 7.54 allows remote attackers to modify properties and methods of the location object and execute Javascript to read arbitrary files from the client's local filesystem or display a false URL to the user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:53

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0131.html - Broken Link () http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0131.html - Broken Link
References () http://osvdb.org/8331 - Broken Link () http://osvdb.org/8331 - Broken Link
References () http://secunia.com/advisories/12233 - Broken Link, Patch, Vendor Advisory () http://secunia.com/advisories/12233 - Broken Link, Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200408-05.xml - Patch, Third Party Advisory () http://www.gentoo.org/security/en/glsa/glsa-200408-05.xml - Patch, Third Party Advisory
References () http://www.greymagic.com/security/advisories/gm008-op/ - Broken Link, Exploit, Vendor Advisory () http://www.greymagic.com/security/advisories/gm008-op/ - Broken Link, Exploit, Vendor Advisory
References () http://www.opera.com/docs/changelogs/windows/754/ - Broken Link, Patch () http://www.opera.com/docs/changelogs/windows/754/ - Broken Link, Patch
References () http://www.securityfocus.com/bid/10873 - Broken Link, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/10873 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16904 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/16904 - Third Party Advisory, VDB Entry

28 Feb 2022, 18:29

Type Values Removed Values Added
CPE cpe:2.3:a:opera_software:opera_web_browser:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0_beta1:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.51:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.11b:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.11j:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.20:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.23:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.20_beta1_build2981:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.52:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.11:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.21:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.53:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.22:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.10:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.50b1:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.50:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0_beta2:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:opera_software:opera_web_browser:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other CWE-74
References (SECUNIA) http://secunia.com/advisories/12233 - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/12233 - Broken Link, Patch, Vendor Advisory
References (OSVDB) http://osvdb.org/8331 - (OSVDB) http://osvdb.org/8331 - Broken Link
References (BID) http://www.securityfocus.com/bid/10873 - Patch (BID) http://www.securityfocus.com/bid/10873 - Broken Link, Patch, Third Party Advisory, VDB Entry
References (CONFIRM) http://www.opera.com/docs/changelogs/windows/754/ - Patch (CONFIRM) http://www.opera.com/docs/changelogs/windows/754/ - Broken Link, Patch
References (MISC) http://www.greymagic.com/security/advisories/gm008-op/ - Exploit, Vendor Advisory (MISC) http://www.greymagic.com/security/advisories/gm008-op/ - Broken Link, Exploit, Vendor Advisory
References (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200408-05.xml - Patch (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200408-05.xml - Patch, Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/16904 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/16904 - Third Party Advisory, VDB Entry
References (FULLDISC) http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0131.html - (FULLDISC) http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0131.html - Broken Link

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:53


NVD link : CVE-2004-2570

Mitre link : CVE-2004-2570

CVE.ORG link : CVE-2004-2570


JSON object : View

Products Affected

opera

  • opera_browser
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')