There is one issue though, José A. Vázquez, security researcher from Spain has made this exploit public 10 days ago, putting Opera users at risk.
According to José, he has discovered the issue 372 days ago and immediately reported it to Opera Software. Unfortunately, it was never fixed. Seeing no light at the end of the tunnel, security researched had no choice but to make such exploit public.
Why did Opera Software refused to fix the issue? According to one of the employees, despite the excessive testing, they weren’t been able to reproduce the issue and have contacted José to obtain more information. However, they never received any new details.
And that brings us to today. If Opera claims are to be believed, the original researcher has found a new way to modify the vector, so the current versions of Opera could be exploited, but he never sent such information for the Opera Software employees to check out.
Whether or not such claims are true, it remains to be seen. Just don’t hold your breath, as we are unlikely to ever find out the truth.
About (Author Profile)
Vygantas is a former web designer whose projects are used by companies such as AMD, NVIDIA and departed Westood Studios. Being passionate about software, Vygantas began his journalism career back in 2007 when he founded FavBrowser.com. Having said that, he is also an adrenaline junkie who enjoys good books, fitness activities and Forex trading.