[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Spoofing attacks in Opera via vectors involving navigation, reloads, and redirects (Mac OS)

ID: oval:org.secpod.oval:def:6160Date: (C)2012-06-20   (M)2023-12-02
Class: VULNERABILITYFamily: macos




The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during unusually timed changes to this field. Successful exploitation allows remote attackers to conduct spoofing attacks via vectors involving navigation, reloads, and redirects.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.8
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X Server 10.8
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Product:
Opera Browser
Reference:
CVE-2012-3558
CVE    1
CVE-2012-3558
CPE    1
cpe:/a:opera:opera

© SecPod Technologies