297 results (0.017 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

21 Mar 2019 — Opera before 57.0.3098.106 is vulnerable to a DLL Search Order hijacking attack where an attacker can send a ZIP archive composed of an HTML page along with a malicious DLL to the target. Once the document is opened, it may allow the attacker to take full control of the system from any location within the system. The issue lies in the loading of the shcore.dll and dcomp.dll files: these files are being searched for by the program in the same system-wide directory where the HTML file is executed. Opera, en v... • https://blogs.opera.com/desktop/changelog-for-57 • CWE-426: Untrusted Search Path •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

28 Mar 2018 — In the WebRTC component in Opera 51.0.2830.55, after visiting a web site that attempts to gather complete client information (such as https://ip.voidsec.com), the browser can disclose a private IP address in a STUN request. En el componente WebRTC en Opera 51.0.2830.55, tras visitar un sitio web que intenta recopilar la información total del cliente (como https://ip.voidsec.com), el navegador puede revelar una dirección IP privada en una petición STUN. • https://docs.google.com/spreadsheets/d/1Nm7mxfFvmdn-3Az-BtE5O0BIdbJiIAWUnkoAF_v_0ug/edit?usp=sharing • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

21 Apr 2017 — Opera Mini 13 and Opera Stable 36 allow remote attackers to spoof the displayed URL via a crafted HTML document, related to the about:blank URL. Opera Mini 13 y Opera Stable 36 permite a atacantes remotos suplantar el URL visualizada a través de un documento HTML manipulado, relacionado con about:blank URL. • http://abhikafle.com.np/opera-url-spoofing-poc • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

26 Jan 2017 — Characters from languages are such as Arabic, Hebrew are displayed from RTL (Right To Left) order in Opera 37.0.2192.105088 for Android, due to mishandling of several unicode characters such as U+FE70, U+0622, U+0623 etc and how they are rendered combined with (first strong character) such as an IP address or alphabet could lead to a spoofed URL. It was noticed that by placing neutral characters such as "/", "?" in filepath causes the URL to be flipped and displayed from Right To Left. However, in order for... • http://www.securityfocus.com/bid/92701 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 8.1EPSS: 0%CPEs: 20EXPL: 2

21 Sep 2016 — The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impe... • http://twitter.com/matthew_d_green/statuses/630908726950674433 • CWE-295: Improper Certificate Validation •

CVSS: 5.3EPSS: 3%CPEs: 6EXPL: 0

06 Sep 2016 — The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack. El protocolo HTTP/2 no considera el rol de la ventana de congestión TCP cuando da información sobre longitud del contenido, lo que facilita a atacantes remotos obtener datos en texto plano aprovechando una configuració... • http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 94%CPEs: 42EXPL: 1

21 May 2015 — The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue. El protocolo TLS 1.2 y anteriores, cuando una suite de cifrado DHE_EXPORT está habilitada en un servidor pero no en un cliente, no t... • https://github.com/fatlan/HAProxy-Keepalived-Sec-HighLoads • CWE-310: Cryptographic Issues CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 7.5EPSS: 0%CPEs: 64EXPL: 0

06 Feb 2014 — Opera before 19 on Mac OS X allows user-assisted remote attackers to spoof the address bar via vectors involving a drag-and-drop operation. Opera anterior a 19 en Mac OS X permite a atacantes remotos asistidos por usuario falsificar la barra de direcciones a través de vectores que involucran operaciones drag-and-drop. • http://blogs.opera.com/security/2014/01/security-changes-features-opera-19 •

CVSS: 7.5EPSS: 0%CPEs: 63EXPL: 0

06 Feb 2014 — The intent: URL implementation in Opera before 18 on Android allows attackers to read local files by leveraging an interaction error, as demonstrated by reading stored cookies. El "intent" de la implementación URL en Opera anterior a 18 en Android permite a atacantes leer archivos locales mediante el aprovechamiento de un error de interacción, tal como se ha demostrado mediante la lectura de cookies almacenadas. • http://blogs.opera.com/security/2014/01/security-changes-features-opera-19 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 174EXPL: 0

13 Sep 2013 — Cross-site scripting (XSS) vulnerability in Opera before 15.00 allows remote attackers to inject arbitrary web script or HTML by leveraging UTF-8 encoding. Vulnerabilidad Cross-site scripting (XSS) en Opera anterior a v15.00 que permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias aprovechamiento la codificación UTF-8. • http://jvn.jp/en/jp/JVN01094166/index.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •