[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80170

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10935 Download | Alert*

The host is installed with Opera before 11.60 and is prone to a same origin policy bypass vulnerability. A flaw is present in the application, which fails to properly implement the in operator. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is installed with Opera before 11.60 and is prone to a same origin policy bypass vulnerability. A flaw is present in the application, which fails to consider the number of . (dot) characters that conventionally exist in domain names of different top-level domains. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is installed with Opera 11.60 or earlier and is prone to information disclosure vulnerability. A flaw is present in the application, which does not prevent capture of data about the times of Same Origin Policy violations during IFRAME loading attempts. Successful exploitation allows remote attackers to determine whether a document exists in the browser cache via crafted JavaScript code.

The host is installed with Opera before 11.64 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly allocate memory for URL strings. Successful exploitation allows remote attackers to cause memory corruption or application crash.

The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during blocked navigation. Successful exploitation allows remote attackers to conduct spoofing attacks by detecting and preventing attempts to load a different web page.

The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during unusually timed changes to this field. Successful exploitation allows remote attackers to conduct spoofing attacks via vectors involving navigation, reloads, and redirects.

The host is installed with Opera before 11.65 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict the reading of JSON strings. Successful exploitation allows remote attackers to perform cross-domain loading of JSON resources and consequently obtain sensitive information via a crafted web site.

The host is installed with Opera before 11.65 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly restrict the opening of a pop-up window in response to the first click of a double-click action. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web ...

The host is installed with Opera before 11.65 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to ensure that keyboard sequences are associated with a visible window. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web site, related to a "hidden keyboard ...

The host is installed with Opera before 9.63 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation could allow attackers to spoof servers and obtain sensitive information.


Pages:      Start    1049    1050    1051    1052    1053    1054    1055    1056    1057    1058    1059    1060    1061    1062    ..   1093

© 2013 SecPod Technologies