Page 2 of 325 results (0.007 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Opera for Android before 54.0.2669.49432 is vulnerable to a sandboxed cross-origin iframe bypass attack. By using a service working inside a sandboxed iframe it is possible to bypass the normal sandboxing attributes. This allows an attacker to make forced redirections without any user interaction from a third-party context. Opera para Android versiones anteriores a 54.0.2669.49432, es vulnerable a un ataque de omisión de iframe de origen cruzado dentro del sandbox. Al utilizar un servicio que funciona dentro de un iframe del sandbox, es posible omitir los atributos normales del sandbox. • https://security.opera.com/bypass-a-restriction-in-ofa-54-opera-security-advisories •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 1

Opera Mini for Android allows attackers to bypass intended restrictions on .apk file download/installation via an RTLO (aka Right to Left Override) approach, as demonstrated by misinterpretation of malicious%E2%80%AEtxt.apk as maliciouskpa.txt. This affects 44.1.2254.142553, 44.1.2254.142659, and 44.1.2254.143214. Opera Mini para Android, permite a atacantes omitir las restricciones previstas en la descarga e instalación de archivos .apk mediante un enfoque RTLO (también se conoce como Right to Left Override), como es demostrado mediante la interpretación errada de malicious%E2%80%AEtxt.apk como maliciouskpa.txt. Esto afecta a las versiones 44.1.2254.142553, 44.1.2254.142659 y 44.1.2254.143214. • http://firstsight.me/2019/10/illegal-rendered-at-download-feature-in-several-apps-including-opera-mini-that-lead-to-extension-manipulation-with-rtlo https://medium.com/%40YoKoKho/illegal-rendered-at-download-feature-in-opera-mini-that-lead-to-extension-manipulation-with-rtlo-685bf2d77d51 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Opera Mini application through 16.0.14 for iOS has a UXSS vulnerability that can be triggered by performing navigation to a javascript: URL. La aplicación Opera Mini hasta el 16.0.14 para iOS tiene una vulnerabilidad de UXSS que puede activarse al realizar la navegación a una javascript: URL. • https://blog.rakeshmane.com/2019/07/u-xss-in-operamini-for-ios-browser-0-day.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Opera before 57.0.3098.106 is vulnerable to a DLL Search Order hijacking attack where an attacker can send a ZIP archive composed of an HTML page along with a malicious DLL to the target. Once the document is opened, it may allow the attacker to take full control of the system from any location within the system. The issue lies in the loading of the shcore.dll and dcomp.dll files: these files are being searched for by the program in the same system-wide directory where the HTML file is executed. Opera, en versiones anteriores a la 57.0.3098.106, es vulnerable a un ataque de secuestro de orden de búsqueda de DLL donde un atacante puede enviar un archivo ZIP compuesto por una página HTML junto con un DLL malicioso al objetivo. Una vez se ha abierto el documento, podría permitir que el atacante obtenga el control total del sistema desde cualquier ubicación en éste. • https://blogs.opera.com/desktop/changelog-for-57 https://lucideustech.blogspot.com/2019/02/opera-search-order-hijacking-cve-2018-18913.html • CWE-426: Untrusted Search Path •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

In the WebRTC component in Opera 51.0.2830.55, after visiting a web site that attempts to gather complete client information (such as https://ip.voidsec.com), the browser can disclose a private IP address in a STUN request. En el componente WebRTC en Opera 51.0.2830.55, tras visitar un sitio web que intenta recopilar la información total del cliente (como https://ip.voidsec.com), el navegador puede revelar una dirección IP privada en una petición STUN. • https://docs.google.com/spreadsheets/d/1Nm7mxfFvmdn-3Az-BtE5O0BIdbJiIAWUnkoAF_v_0ug/edit?usp=sharing https://github.com/VoidSec/WebRTC-Leak https://news.ycombinator.com/item?id=16699270 https://voidsec.com/vpn-leak https://www.bleepingcomputer.com/news/security/many-vpn-providers-leak-customers-ip-address-via-webrtc-bug • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •