5.1
CVSSv2

CVE-2006-1834

Published: 19/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 515
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer signedness error in Opera prior to 8.54 allows remote malicious users to execute arbitrary code via long values in a stylesheet attribute, which pass a length check. NOTE: a sign extension problem makes the attack easier with shorter strings.

Vulnerable Product Search on Vulmon Subscribe to Product

opera opera browser 8.50

opera opera browser 8.02

opera opera browser 7.52

opera opera browser 7.51

opera opera browser 7.53

opera opera browser 7.10

opera opera browser 7.0

opera opera browser 7.01

opera opera browser

opera opera browser 8.0

opera opera browser 7.21

opera opera browser 7.22

opera opera browser 7.20

opera opera browser 7.11

opera opera browser 6.06

opera opera browser 6.01

opera opera browser 6.12

opera opera browser 6.11

opera opera browser 5.0

opera opera browser 5.11

opera opera browser 4.01

opera opera browser 4.00

opera opera browser 3.61

opera opera browser 3.50

opera opera browser 2.12

opera opera browser 2.10

opera opera browser 6.0

opera opera browser 6.02

opera opera browser 5.02

opera opera browser 3.62

opera opera browser 3.00

opera opera browser 1.00

opera opera browser 8.52

opera opera browser 8.51

opera opera browser 7.54

opera opera browser 7.50

opera opera browser 7.03

opera opera browser 7.23

opera opera browser 6.03

opera opera browser 5.10

opera opera browser 5.12

opera opera browser 3.51

opera opera browser 3.10

opera opera browser 3.21

opera opera browser 2.00

opera opera browser 8.01

opera opera browser 7.02

opera opera browser 7.60

opera opera browser 6.04

opera opera browser 6.05

opera opera browser 6.1

opera opera browser 4.02

opera opera browser 3.60

Exploits

source: wwwsecurityfocuscom/bid/17513/info Opera is prone to a buffer-overflow vulnerability This issue is due to the application's failure to properly bounds-check user-supplied input before using it in a string-copy operation This issue allows remote attackers to crash affected web browsers Due to the nature of this issue, attackers ...