lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 14 Jun 2012 18:48:49 +0800
From: Code Audit Labs <>
Subject: [CAL-2012-0015] opera website spoof

     CAL-2012-0015 opera website spoof

CVE ID: Opera did not assign ,please assign
CAL ID: CAL-2012-0015

1 Affected Products
11.61 and prior

2 Vulnerability Details

Code Audit Labs has discovered a website
spoof vulnerability in Opera .When a user types a new URL for the
browser to load, the currently active page may detect when the
new page is about to load and prevent the navigation, while still
leaving the new URL displayed in the address bar. This can then be
used to spoof the URL of the target page. The malicious page would
need to employ social engineering tactics in order to guess what
page the user is likely to try to load next, as it cannot see what
 URL the user has typed.

3: how to fixed
Opera Software has released Opera 12 and Opera 11.65,
where this issue has been fixed.

4 About Code Audit Labs:
Code Audit Labs secure your software,provide Professional include source
code audit and binary code audit service.
Code Audit Labs:” You create value for customer,We protect your value”

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists