Логотип exploitDog
bind:CVE-2009-2063
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2009-2063

Количество 2

Количество 2

nvd логотип

CVE-2009-2063

больше 16 лет назад

Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-5qmq-wqf9-chpc

почти 4 года назад

Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2009-2063

Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

CVSS2: 6.8
0%
Низкий
больше 16 лет назад
github логотип
GHSA-5qmq-wqf9-chpc

Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу