Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opera opera browser vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2007-1737
Opera 9.10 does not check URLs embedded in (1) object or (2) iframe HTML tags against the phishing site blacklist, which allows remote malicious users to bypass phishing protection.
Opera Opera Browser 9.10
668
VMScore
CVE-2006-3198
Integer overflow in Opera 8.54 and previous versions allows remote malicious users to execute arbitrary code via a JPEG image with large height and width values, which causes less memory to be allocated than intended.
Opera Opera Browser
668
VMScore
CVE-2005-3750
Opera prior to 8.51 on Linux and Unix systems allows remote malicious users to execute arbitrary code via shell metacharacters (backticks) in a URL that another product provides in a command line argument when launching Opera.
Opera Opera Browser
668
VMScore
CVE-2005-1475
The XMLHttpRequest object in Opera 8.0 Final Build 1095 allows remote malicious users to bypass access restrictions and perform unauthorized actions on other domains via a redirect.
Opera Opera Browser
668
VMScore
CVE-2005-1139
Opera 8 Beta 3, when using first-generation vetted digital certificates, displays the Organizational information of an SSL certificate, which is easily spoofed and can facilitate phishing attacks.
Opera Opera Browser 8.0
668
VMScore
CVE-2005-0233
The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla prior to 1.7.6 allows remote malicious users to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from o...
Mozilla Camino 0.8.5
Mozilla Firefox 1.0
Mozilla Mozilla
Omnigroup Omniweb 5
Opera Opera Browser
Opera Software Opera Web Browser 7.54
668
VMScore
CVE-2004-1157
Opera 7.x up to 7.54, and possibly other versions, allows remote malicious users to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web si...
Opera Opera Browser
668
VMScore
CVE-2003-0593
Opera allows remote malicious users to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Opera to send the cookie outside the specified URL subsets, e.g. to a vulnerable ap...
Opera Opera Browser 5.0
Opera Opera Browser 5.02
Opera Opera Browser 5.10
Opera Opera Browser 5.11
Opera Opera Browser 5.12
Opera Opera Browser 6.0
Opera Opera Browser 6.01
Opera Opera Browser 6.02
Opera Opera Browser 6.03
Opera Opera Browser 6.04
Opera Opera Browser 6.05
Opera Opera Browser 6.06
Opera Opera Browser 6.10
Opera Opera Browser 7.0
Opera Opera Browser 7.01
Opera Opera Browser 7.02
Opera Opera Browser 7.03
Opera Opera Browser 7.10
Opera Opera Browser 7.11
Opera Opera Browser 7.20
Opera Opera Browser 7.21
Opera Opera Browser 7.22
668
VMScore
CVE-2002-1091
Netscape 6.2.3 and previous versions, and Mozilla 1.0.1, allow remote malicious users to corrupt heap memory and execute arbitrary code via a GIF image with a zero width.
Mozilla Mozilla 0.9.9
Mozilla Mozilla 1.0
Opera Software Opera Web Browser 6.0.1
Mozilla Mozilla 0.9.5
Mozilla Mozilla 0.9.6
Netscape Navigator 6.2.2
Netscape Navigator 6.2.3
Mozilla Mozilla 0.9.7
Mozilla Mozilla 0.9.8
Opera Software Opera Web Browser 5.12
Opera Software Opera Web Browser 6.0
Netscape Navigator 6.2
Netscape Navigator 6.2.1
668
VMScore
CVE-2002-0243
Cross-site scripting vulnerability in Opera 6.0 and previous versions allows remote malicious users to execute arbitrary script via an Extended HTML Form, whose output from the remote server is not properly cleansed.
Opera Software Opera Web Browser
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »