[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Opera before 9.52.10108.0 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to properly escape before storage in the History Search database (aka md.dat). Successful exploitation allows remote attackers to inject arbitrary web script or HTML via the query string.

The host is installed with Opera before 9.63 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to reveal random data.

The host is installed with Opera before 9.60 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle applet execution within the local-machine context. Successful exploitation allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching ...

The host is installed with Opera before 9.52 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to prevent use of links from web pages to feed source files on the local disk. Successful exploitation allows remote attackers to determine the validity of local filenames via vectors involving detection of JavaScript events and appropriate manipulation.

The host is installed with Opera before 9.51 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly manage memory within functions supporting the CANVAS element. Successful exploitation allows remote attackers to read uninitialized memory contents.

The host is installed with Opera before 9.50 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle HTML CANVAS elements that use the images as patterns. Successful exploitation allows remote attackers to read cross-domain images.

The host is installed with Opera before 11.0 and is prone to an information disclosure vulnerability. A flaw is present in the browser, it fails to handle Wireless Application Protocol (WAP) sessions due to form fields not being cleared when a new session is started. Successful exploitation could allow a remote attacker to obtain sensitive information like form data of other sites.

The host is installed with Opera before 12.15 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to properly block top-level domains in Set-Cookie headers. Successful exploitation allows attackers to obtain sensitive information by leveraging control of a different web site in the same top-level domain.

The host is installed with Opera before 9.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle images that contain custom comments. Successful exploitation allows user-assisted remote attackers to execute arbitrary script via images that contain custom comments, which are treated as script when the user displays the image properties.

The host is installed with Opera before 9.60 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle a redirect that specifies a crafted URL. Successful exploitation allows remote attackers to cause a denial of service (application crash) or execute arbitrary code.


Pages:      Start    1251    1252    1253    1254    1255    1256    1257    1258    1259    1260    1261    1262    1263    1264    ..   1429

© SecPod Technologies