Spoofing attacks in Opera via vectors involving navigation, reloads, and redirects (Mac OS)ID: oval:org.secpod.oval:def:6160 | Date: (C)2012-06-20 (M)2023-12-02 |
Class: VULNERABILITY | Family: macos |
The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during unusually timed changes to this field. Successful exploitation allows remote attackers to conduct spoofing attacks via vectors involving navigation, reloads, and redirects.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X Server 10.10 |