Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q8xj-jc5p-r4vm

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Opera 7.x and 8 before 8.01 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."

Opera 7.x and 8 before 8.01 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."

EPSS

Процентиль: 56%
0.00335
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

Opera 7.x and 8 before 8.01 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."

EPSS

Процентиль: 56%
0.00335
Низкий