Address spoofing vulnerability in Opera by triggering the launch of a dialog window (rpm)ID: oval:org.secpod.oval:def:4949 | Date: (C)2012-03-30 (M)2023-12-02 |
Class: VULNERABILITY | Family: unix |
The host is installed with Opera Browser before 11.62 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the Web page dialogs. Successful exploitation allows remote attackers to spoof the address field by triggering the launch of a dialog window associated with a different domain.