[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111666

 
 

909

 
 

87321

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 13303 Download | Alert*

The host is installed with Opera before 12.01 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a small window for the download dialog. Successful exploitation allows user-assisted remote attackers to trick users into downloading and executing arbitrary files.

The host is installed with Opera before 12.01 and is prone to Cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly escape characters in DOM elements. Successful exploitation allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via a crafted HTML document.

The host is installed with Opera before 12.01 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to a "low severity issue." Successful exploitation has unknown impact and attack vectors.

The host is installed with Opera before 12.01 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation allows remote attackers to cause application crash.

The host is installed with Opera before 15.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Opera before 12.15 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to properly block top-level domains in Set-Cookie headers. Successful exploitation allows attackers to obtain sensitive information by leveraging control of a different web site in the same top-level domain.

The host is installed with Opera before 12.15 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain weakness in the RC4 encryption protocol. Successful exploitation allows attackers to deduce the plaintext and has some unknown impact and attack vectors.

Opera 9.64 allows remote attackers to cause a denial of service (application crash) via an XML document containing a long series of start-tags with no corresponding end-tags. NOTE: it was later reported that 9.52 is also affected.

Opera before 10.00 on Linux, Solaris, and FreeBSD does not properly implement the "INPUT TYPE=file" functionality, which allows remote attackers to trick a user into uploading an unintended file via vectors involving a "dropped file."

Opera before 9.64 allows remote attackers to execute arbitrary code via a crafted JPEG image that triggers memory corruption.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   1330

© SecPod Technologies