Page 11 of 225 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 126EXPL: 0

Opera before 11.62 allows remote attackers to bypass the Same Origin Policy via the (1) history.pushState and (2) history.replaceState functions in conjunction with cross-domain frames, leading to unintended read access to history.state information. Opera antes de v11.62 permite a atacantes remotos evitar la política de mismo origen a través de las funciones (1) history.pushState y (2) history.replaceState junto con marcos de dominios cruzados, dando lugar a un acceso de lectura no intencionado a la información de history.state. • http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html http://osvdb.org/80622 http://secunia.com/advisories/48535 http://www.opera.com/docs/changelogs/mac/1162 http://www.opera.com/docs/changelogs/unix/1162 http://www.opera.com/docs/changelogs/windows/1162 http://www.opera.com/support/kb/view/1012 https://exchange.xforce.ibmcloud.com/vulnerabilities/74351 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.4EPSS: 1%CPEs: 126EXPL: 0

Opera before 11.62 allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain. Opera antes de v11.62 permite a atacantes remotos falsificar el campo de la dirección mediante la recarga de la página seguido de una redirección a un dominio diferente. • http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html http://osvdb.org/80624 http://secunia.com/advisories/48535 http://www.opera.com/docs/changelogs/mac/1162 http://www.opera.com/docs/changelogs/unix/1162 http://www.opera.com/docs/changelogs/windows/1162 http://www.opera.com/support/kb/view/1014 https://exchange.xforce.ibmcloud.com/vulnerabilities/74353 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 125EXPL: 1

Multiple integer overflows in Opera 11.60 and earlier allow remote attackers to cause a denial of service (application crash) via a large integer argument to the (1) Int32Array, (2) Float32Array, (3) Float64Array, (4) Uint32Array, (5) Int16Array, or (6) ArrayBuffer function. NOTE: the vendor reportedly characterizes this as "a stability issue, not a security issue." Múltiples desbordamientos de enteros en Opera v11.60 y anteriores permiten a atacantes remotos causar una denegación de servicio (caída de la aplicación) a través de un argumento entero demasiado grande a las funciones (1) Int32Array, (2) Float32Array, (3) Float64Array, (4) Uint32Array, (5 ) Int16Array, o (6) ArrayBuffer. NOTA: El proveedor indica que "se trata de un problema de estabilidad, no un problema de seguridad". • http://blog.vulnhunt.com/index.php/2012/02/02/cal-2012-0004-opera-array-integer-overflow https://exchange.xforce.ibmcloud.com/vulnerabilities/73027 • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 0%CPEs: 123EXPL: 0

Opera before 11.60 does not properly consider the number of . (dot) characters that conventionally exist in domain names of different top-level domains, which allows remote attackers to bypass the Same Origin Policy by leveraging access to a different domain name in the same top-level domain, as demonstrated by the .no or .uk domain. Opera antes de 11.60 no tiene en cuenta debidamenteel número de caracteres . (punto) que tradicionalmente existen en los nombres de dominio de los diferentes dominios de nivel superior, lo que permite a atacantes remotos evitar la política del mismo origen, aprovechando el acceso a un nombre de dominio diferente en el mismo dominio de nivel superior, como se demuestra con los dominios .no o .uk. • http://www.opera.com/docs/changelogs/mac/1160 http://www.opera.com/docs/changelogs/unix/1160 http://www.opera.com/docs/changelogs/windows/1160 http://www.opera.com/support/kb/view/1003 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.4EPSS: 0%CPEs: 123EXPL: 0

The JavaScript engine in Opera before 11.60 does not properly implement the in operator, which allows remote attackers to bypass the Same Origin Policy via vectors related to variables on different web sites. El motor JavaScript en Opera antes de v11.60, no implementa adecuadamente el operador, lo que permite a atacantes remotos evitar la política del mismo origen (Same Origin Policy) a través de vectores relacionados con las variables en diferentes sitios web. • http://www.opera.com/docs/changelogs/mac/1160 http://www.opera.com/docs/changelogs/unix/1160 http://www.opera.com/docs/changelogs/windows/1160 http://www.opera.com/support/kb/view/1005 • CWE-264: Permissions, Privileges, and Access Controls •