Opera before 9.23 allows remote attackers to execute arbitrary code via crafted Javascript that triggers a "virtual function call on an invalid pointer."
References
Link | Resource |
---|---|
http://www.opera.com/support/search/view/865/ | Broken Link Vendor Advisory |
http://www.securityfocus.com/bid/25331 | Broken Link Exploit Third Party Advisory VDB Entry |
http://secunia.com/advisories/26477 | Broken Link Patch |
http://security.gentoo.org/glsa/glsa-200708-17.xml | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2007-08/msg00006.html | Third Party Advisory |
http://www.securitytracker.com/id?1018572 | Broken Link Third Party Advisory VDB Entry |
http://secunia.com/advisories/26635 | Broken Link |
http://secunia.com/advisories/26545 | Broken Link |
http://www.vupen.com/english/advisories/2007/2904 | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36039 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2007-08-15 16:17
Updated : 2022-02-25 19:59
NVD link : CVE-2007-4367
Mitre link : CVE-2007-4367
JSON object : View
CWE
CWE-763
Release of Invalid Pointer or Reference
Products Affected
opera
- opera_browser