CVE-2009-2059
15.06.2009, 19:30
Opera, possibly before 9.25, uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.Enginsight
Vendor | Product | Version |
---|---|---|
opera | opera_browser | 𝑥 ≤ 9.22 |
opera | opera_browser | 7.0 |
opera | opera_browser | 7.23 |
opera | opera_browser | 7.53 |
opera | opera_browser | 7.54 |
opera | opera_browser | 7.60 |
opera | opera_browser | 8.0 |
opera | opera_browser | 8.01 |
opera | opera_browser | 8.02 |
opera | opera_browser | 8.50 |
opera | opera_browser | 8.51 |
opera | opera_browser | 8.52 |
opera | opera_browser | 8.53 |
opera | opera_browser | 8.54 |
opera | opera_browser | 9.0 |
opera | opera_browser | 9.01 |
opera | opera_browser | 9.02 |
opera | opera_browser | 9.10 |
opera | opera_browser | 9.12 |
opera | opera_browser | 9.20 |
opera | opera_browser | 9.21 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration