[Forgot Password]
Login  Register Subscribe

23631

 
 

119105

 
 

98250

 
 

909

 
 

79281

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11879 Download | Alert*

The host is installed with Opera Browser before 11.62 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the reloads and redirects. Successful exploitation allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain.

The host is installed with Opera Browser before 11.62 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the Web page dialogs. Successful exploitation allows remote attackers to spoof the address field by triggering the launch of a dialog window associated with a different domain.

The host is installed with Opera Browser before 11.62 and is prone to Same Origin Policy bypass vulnerability. A flaw is present in the application, which fails to handle history.pushState and history.replaceState functions in conjunction with cross-domain frames. Successful exploitation allows emote attackers to gain unintended read access to history.state information.

The host is installed with Opera Browser before 11.62 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to ensure that a dialog window is placed on top of content windows. Successful exploitation allows remote attackers to trick users into downloading and executing arbitrary files via a download dialog located under other windows.

The host is installed with Opera Browser before 11.62 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to ensure small windows. Successful exploitation allows user-assisted remote attackers to trick users into downloading and executing arbitrary files via a small window for the download dialog.

The host is installed with Opera before 11.64 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly allocate memory for URL strings. Successful exploitation allows remote attackers to cause memory corruption or application crash.

The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during blocked navigation. Successful exploitation allows remote attackers to conduct spoofing attacks by detecting and preventing attempts to load a different web page.

The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during unusually timed changes to this field. Successful exploitation allows remote attackers to conduct spoofing attacks via vectors involving navigation, reloads, and redirects.

The host is installed with Opera before 11.65 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict the reading of JSON strings. Successful exploitation allows remote attackers to perform cross-domain loading of JSON resources and consequently obtain sensitive information via a crafted web site.

The host is installed with Opera before 11.65 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly restrict the opening of a pop-up window in response to the first click of a double-click action. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web ...


Pages:      Start    1138    1139    1140    1141    1142    1143    1144    1145    1146    1147    1148    1149    1150    1151    ..   1187

© 2013 SecPod Technologies