Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2009-4071
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Opera before 10.10, when exception stacktraces are enabled, places scripting error messages from a web site into variables that can be read by a different web site, which allows remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via unspecified vectors.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Opera Web出错消息跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Opera Software Opera是挪威欧朋(Opera Software)公司的一款Web浏览器,它支持多窗口浏览、自定义用户界面等功能。 正常情况下仅应在导致错误的页面上出现脚本出错消息,但在某些情况下可以无关变量内容的形式向其他站点传送出错消息,其中可能包含有敏感信息。如果这些站点将内容写入到了页面标记中,就可以使用攻击站点所提供的代码执行跨站脚本攻击。这个漏洞仅影响启用了对异常的栈追踪的系统(默认为禁用)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2009-4071
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2009-4071
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2009-4071

No comments yet


Leave a comment