Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opera opera mini vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-18624
Opera Mini for Android allows malicious users to bypass intended restrictions on .apk file download/installation via an RTLO (aka Right to Left Override) approach, as demonstrated by misinterpretation of malicious%E2%80%AEtxt.apk as maliciouskpa.txt. This affects 44.1.2254.142553...
Opera Mini 44.1.2254.142553
Opera Mini 44.1.2254.142659
Opera Mini 44.1.2254.143214
NA
CVE-2012-5180
The Opera Mobile application prior to 12.1 and Opera Mini application prior to 7.5 for Android do not properly implement the WebView class, which allows malicious users to obtain sensitive information via a crafted application.
Opera Opera Mini
Opera Opera Mobile
6.1
CVSSv3
CVE-2016-4075
Opera Mini 13 and Opera Stable 36 allow remote malicious users to spoof the displayed URL via a crafted HTML document, related to the about:blank URL.
Opera Opera Mini 13.00
Opera Opera Browser 36.0
5.3
CVSSv3
CVE-2021-23253
Opera Mini for Android below 53.1 displays URL left-aligned in the address field. This allows a malicious malicious user to craft a URL with a long domain name, e.g. www.safe.opera.com.attacker.com. With the URL being left-aligned, the user will only see the front part (e.g. www....
Opera Opera Mini
6.5
CVSSv3
CVE-2018-16135
The Opera Mini application 47.1.2249.129326 for Android allows remote malicious users to spoof the Location Permission dialog via a crafted web site.
Opera Opera Mini 47.1.2249.129326
6.1
CVSSv3
CVE-2019-13607
The Opera Mini application up to and including 16.0.14 for iOS has a UXSS vulnerability that can be triggered by performing navigation to a javascript: URL.
Opera Mini
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started