Vulnerability Name: | CVE-2005-2406 (CCN-21028) | ||||||||
Assigned: | 2005-06-16 | ||||||||
Published: | 2005-06-16 | ||||||||
Updated: | 2022-02-28 | ||||||||
Summary: | Opera 8.01 allows remote attackers to conduct cross-site scripting (XSS) attacks or modify which files are uploaded by tricking a user into dragging an image that is a "javascript:" URI. | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||
Vulnerability Type: | CWE-79 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2005-1669 Source: MITRE Type: CNA CVE-2005-2406 Source: CCN Type: SA15411 Opera "javascript:" URL Cross-Site Scripting Vulnerability Source: CCN Type: SA15756 Opera Image Dragging Vulnerability Source: SECUNIA Type: Broken Link, Patch 15756 Source: CCN Type: SECTRACK ID: 1014593 Opera `javascript:` Object Dragging Flaw May Let Remote Users Conduct Cross-Site Scripting Attacks Source: SECTRACK Type: Broken Link, Third Party Advisory, VDB Entry 1014593 Source: CCN Type: Opera Web site Opera Software - The Best Internet Experience Source: CCN Type: Opera Download Web page Opera 8.01 for Windows, English (US) version Source: CONFIRM Type: Broken Link, Patch http://www.opera.com/linux/changelogs/802/ Source: CCN Type: OSVDB ID: 17543 Opera javascript: URL XSS Source: CCN Type: OSVDB ID: 18469 Opera javascript: URI Object Dragging Arbitrary Script Execution Source: CCN Type: BID-13969 Opera Web Browser Cross-Site Scripting Local File Disclosure Vulnerability Source: BID Type: Broken Link, Third Party Advisory, VDB Entry 14410 Source: CCN Type: BID-14410 Opera Web Browser Image Dragging Cross-Domain Scripting and File Retrieval Vulnerability Source: VUPEN Type: Broken Link ADV-2005-1251 Source: XF Type: UNKNOWN opera-javascript-xss(21028) Source: SUSE Type: SUSE-SA:2005:034 opera: various problems | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |