Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Opera Multiple Vulnerabilities - June12 (Mac OS X)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is installed with Opera and is prone to multiple vulnerabilities.
Insight
Insight
- An error when displaying preferences within a small window can be exploited to execute arbitrary code by tricking a user into entering a specific keyboard sequence. - An error when displaying pop-up windows can be exploited to execute script code by tricking a user into following a specific sequence of events. - An error when handling JSON resources can be exploited to bypass the cross domain policy restriction and disclose certain information to other sites. - An unspecified error can be exploited to display arbitrary content while showing the URL of a trusted web site in the address bar. - An error when handling page loads can be exploited to display arbitrary content while showing the URL of a trusted web site in the address.
Affected Software
Affected Software
Opera version prior to 11.65 on Mac OS X
Solution
Solution
Upgrade to Opera version 11.65 or 12 or later.
Common Vulnerabilities and Exposures (CVE)
References
- http://secunia.com/advisories/49533/
- http://www.opera.com/support/kb/view/1018/
- http://www.opera.com/support/kb/view/1019/
- http://www.opera.com/support/kb/view/1020/
- http://www.opera.com/support/kb/view/1021/
- http://www.opera.com/support/kb/view/1022/
- http://www.opera.com/docs/changelogs/mac/1165/
- http://www.opera.com/docs/changelogs/mac/1200/