Vulnerability Name: | CCN-11242 | ||||||
Published: | 2003-02-04 | ||||||
Updated: | 2003-02-04 | ||||||
Summary: | Opera could allow a remote attacker to obtain a list of any URLs that a victim has visited that resulted in an error. A remote attacker could create a malicious Web page that uses the opera.errorIndex() and opera.errorMessage() methods to obtain a list of all Web pages that the user has previously visited that contained an error that caused an exception to be thrown in Opera. This would result in a violation of Opera's security policy. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||
Vulnerability Consequences: | Obtain Information | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Tue Feb 04 2003 - 16:04:53 CST Re: Opera: What's Next (GM#005-OP) Source: CCN Type: BugTraq Mailing List, Wed Feb 05 2003 - 04:22:10 CST RE: Opera: What's Next (GM#005-OP) Source: CCN Type: GreyMagic Security Advisory GM#006-OP Sniffing Opera's Tracks. Source: CCN Type: Opera Web site Opera Software - The Best Internet Experience Source: CCN Type: BID-6759 Opera Error Message History Disclosure Weakness Source: XF Type: UNKNOWN opera-error-method-access(11242) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |