Vulnerabilities (CVE)

Filtered by vendor Opera Subscribe
Filtered by product Opera
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-6159 1 Opera 1 Opera 2020-12-23 4.3 MEDIUM 6.1 MEDIUM
URLs using “javascript:” have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.
CVE-2019-12278 1 Opera 1 Opera 2020-08-24 4.3 MEDIUM 4.3 MEDIUM
Opera through 53 on Android allows Address Bar Spoofing. Characters from several languages are displayed in Right-to-Left order, due to mishandling of several Unicode characters. The rendering mechanism, in conjunction with the "first strong character" concept, may improperly operate on a numerical IP address or an alphabetic string, leading to a spoofed URL.
CVE-2019-19788 1 Opera 1 Opera 2020-01-07 2.1 LOW 5.5 MEDIUM
Opera for Android before 54.0.2669.49432 is vulnerable to a sandboxed cross-origin iframe bypass attack. By using a service working inside a sandboxed iframe it is possible to bypass the normal sandboxing attributes. This allows an attacker to make forced redirections without any user interaction from a third-party context.
CVE-2016-7152 5 Apple, Google, Microsoft and 2 more 6 Safari, Chrome, Edge and 3 more 2017-02-19 5.0 MEDIUM 5.3 MEDIUM
The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.