[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10984 Download | Alert*

The host is installed with Opera before 11.0 and is prone to an information disclosure vulnerability. A flaw is present in the browser, it fails to handle Wireless Application Protocol (WAP) sessions due to form fields not being cleared when a new session is started. Successful exploitation could allow a remote attacker to obtain sensitive information like form data of other sites.

The host is installed with Opera before 12.15 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to properly block top-level domains in Set-Cookie headers. Successful exploitation allows attackers to obtain sensitive information by leveraging control of a different web site in the same top-level domain.

The host is installed with Opera before 12.15 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to properly block top-level domains in Set-Cookie headers. Successful exploitation allows attackers to obtain sensitive information by leveraging control of a different web site in the same top-level domain.

The host is installed with Opera Browser before 11.62 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle printing when used in conjunction with an unspecified printing application. Successful exploitation allows attackers to overwrite arbitrary files via a symlink attack on a temporary file during printing.

The host is installed with Opera Browser before 11.62 and is prone to information disclosure vulnerability. A flaw is present in the application, which uses world-readable permissions for temporary files during printing. Successful exploitation allows attackers to obtain sensitive information by reading these files.

The host is installed with Opera Browser before 11.62 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle printing when used in conjunction with an unspecified printing application. Successful exploitation allows attackers to to overwrite arbitrary files via a symlink attack on a temporary file during printing.

The host is installed with Opera Browser before 11.62 and is prone to information disclosure vulnerability. A flaw is present in the application, which uses world-readable permissions for temporary files during printing. Successful exploitation allows attackers to obtain sensitive information by reading these files.

The host is installed with Opera before 12.15 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain weakness in the RC4 encryption protocol. Successful exploitation allows attackers to deduce the plaintext and has some unknown impact and attack vectors.

The host is installed with Opera before 12.15 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain weakness in the RC4 encryption protocol. Successful exploitation allows attackers to deduce the plaintext and has some unknown impact and attack vectors.

The host is installed with Opera 11.60 or prior and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle a large integer argument to the (1) Int32Array, (2) Float32Array, (3) Float64Array, (4) Uint32Array, (5) Int16Array, or (6) ArrayBuffer function. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1060    1061    1062    1063    1064    1065    1066    1067    1068    1069    1070    1071    1072    1073    ..   1098

© SecPod Technologies