Opera 54.0.2669.49432 for Android

CPE Details

Opera 54.0.2669.49432 for Android
54.0.2669.49432
2020-01-06
18h46 +00:00
2020-01-06
18h46 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:opera:opera:54.0.2669.49432:*:*:*:*:android:*:*

Informations

Vendor

opera

Product

opera

Version

54.0.2669.49432

Target Software

android

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-6159 2020-12-23 14h08 +00:00 URLs using “javascript:” have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.
6.1
Moyen
CVE-2008-5679 2008-12-19 15h09 +00:00 The HTML parsing engine in Opera before 9.63 allows remote attackers to execute arbitrary code via crafted web pages that trigger an invalid pointer calculation and heap corruption.
9.3
CVE-2008-4696 2008-10-23 19h00 +00:00 Cross-site scripting (XSS) vulnerability in Opera.dll in Opera before 9.61 allows remote attackers to inject arbitrary web script or HTML via the anchor identifier (aka the "optional fragment"), which is not properly escaped before storage in the History Search database (aka md.dat).
4.3
CVE-2003-1561 2008-07-14 21h00 +00:00 Opera, probably before 7.50, sends Referer headers containing https:// URLs in requests for http:// URLs, which allows remote attackers to obtain potentially sensitive information by reading Referer log data.
4.3
CVE-2008-3172 2008-07-14 21h00 +00:00 Opera allows web sites to set cookies for country-specific top-level domains that have DNS A records, such as co.tv, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session, aka "Cross-Site Cooking."
6.8