|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> Opera < 8.50 Multiple Vulnerabilities Vulnerability Assessment Details
|
Opera < 8.50 Multiple Vulnerabilities |
||
Checks for multiple vulnerabilities in Opera < 8.50 Detailed Explanation for this Vulnerability Assessment Summary : The remote host contains a web browser which is vulnerable to attachment spoofing, script insertion and unintentional file uploads. Description : The remote host is using Opera, an alternative web browser. The installed version of Opera on the remote host contains two flaws its mail client and one in the browser. First, message attachments are opened from the user's cache directory without any warnings, which can be exploited to execute arbitrary Javascript within the context of 'file://'. Second, appending an additional '.' to an attachment's filename causes the file type to be spoofed. And third, the browser is affected by an unspecified drag-and-drop vulnerability that facilitates unintentional file uploads. See also : http://secunia.com/secunia_research/2005-42/advisory/ http://www.opera.com/docs/changelogs/windows/850/ Solution : Upgrade to Opera 8.50 or later. Network Security Threat Level: Medium / CVSS Base Score : 4 (AV:R/AC:H/Au:NR/C:P/A:N/I:P/B:N) Networks Security ID: 14880, 14884 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |