Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opera mini vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2019-18624
Opera Mini for Android allows malicious users to bypass intended restrictions on .apk file download/installation via an RTLO (aka Right to Left Override) approach, as demonstrated by misinterpretation of malicious%E2%80%AEtxt.apk as maliciouskpa.txt. This affects 44.1.2254.142553...
Opera Mini 44.1.2254.142553
Opera Mini 44.1.2254.142659
Opera Mini 44.1.2254.143214
4.3
CVSSv2
CVE-2012-5180
The Opera Mobile application prior to 12.1 and Opera Mini application prior to 7.5 for Android do not properly implement the WebView class, which allows malicious users to obtain sensitive information via a crafted application.
Opera Opera Mini
Opera Opera Mobile
5
CVSSv2
CVE-2021-23253
Opera Mini for Android below 53.1 displays URL left-aligned in the address field. This allows a malicious malicious user to craft a URL with a long domain name, e.g. www.safe.opera.com.attacker.com. With the URL being left-aligned, the user will only see the front part (e.g. www....
Opera Opera Mini
NA
CVE-2018-16135
The Opera Mini application 47.1.2249.129326 for Android allows remote malicious users to spoof the Location Permission dialog via a crafted web site.
Opera Opera Mini 47.1.2249.129326
5.8
CVSSv2
CVE-2016-4075
Opera Mini 13 and Opera Stable 36 allow remote malicious users to spoof the displayed URL via a crafted HTML document, related to the about:blank URL.
Opera Opera Mini 13.00
Opera Opera Browser 36.0
4.3
CVSSv2
CVE-2019-13607
The Opera Mini application up to and including 16.0.14 for iOS has a UXSS vulnerability that can be triggered by performing navigation to a javascript: URL.
Opera Mini
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
injection
CVE-2024-30983
CVE-2023-4235
CVE-2024-21338
privilege
encryption
CVE-2023-4232
CVE-2024-31497
CVE-2024-32341
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started