[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Opera before 9.50 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle HTML CANVAS elements that use the images as patterns. Successful exploitation allows remote attackers to read cross-domain images.

The host is installed with Opera before 11.0 and is prone to an information disclosure vulnerability. A flaw is present in the browser, it fails to handle Wireless Application Protocol (WAP) sessions due to form fields not being cleared when a new session is started. Successful exploitation could allow a remote attacker to obtain sensitive information like form data of other sites.

The host is installed with Opera before 12.15 and is prone to information-disclosure vulnerability. A flaw is present in the application, which fails to properly block top-level domains in Set-Cookie headers. Successful exploitation allows attackers to obtain sensitive information by leveraging control of a different web site in the same top-level domain.

The host is installed with Opera before 9.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle images that contain custom comments. Successful exploitation allows user-assisted remote attackers to execute arbitrary script via images that contain custom comments, which are treated as script when the user displays the image properties.

The host is installed with Opera before 9.60 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle a redirect that specifies a crafted URL. Successful exploitation allows remote attackers to cause a denial of service (application crash) or execute arbitrary code.

The host is installed with Opera before 12.15 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain weakness in the RC4 encryption protocol. Successful exploitation allows attackers to deduce the plaintext and has some unknown impact and attack vectors.

The host is installed with Opera 11.60 or prior and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle a large integer argument to the (1) Int32Array, (2) Float32Array, (3) Float64Array, (4) Uint32Array, (5) Int16Array, or (6) ArrayBuffer function. Successful exploitation could allow attackers to crash the service.

The host is installed with Opera before 11.50 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle invalid URLs. Successful exploitation allow remote attackers to cause a denial of service (disk consumption).

The host is installed with Opera before 11.50 and is prone to unspecified vulnerability. A flaw is present in the application which fails to handle impact and attack vectors, related to a "moderately severe issue". Successful exploitation allow remote attackers to cause a denial of service (application crash).

The host is installed with Opera before 11.50 and is prone to unspecified vulnerability. A flaw is present in the application which fails to handle printing function. Successful exploitation allow remote attackers to cause a denial of service (application crash).


Pages:      Start    1327    1328    1329    1330    1331    1332    1333    1334    1335    1336    1337    1338    1339    1340    ..   1502

© SecPod Technologies