Opera Opera Maker of web browsers

Do you want an email whenever new security vulnerabilities are reported in any Opera product?

Products by Opera Sorted by Most Security Vulnerabilities since 2018

Opera Browser61 vulnerabilities

Opera3 vulnerabilities

Opera Mini3 vulnerabilities

Opera Mini2 vulnerabilities

Opera Touch1 vulnerability

By the Year

In 2024 there have been 0 vulnerabilities in Opera . Opera did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 1 6.50
2021 1 5.30
2020 3 4.90
2019 3 7.13
2018 1 4.30

It may take a day or so for new Opera vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Opera Security Vulnerabilities

The Opera Mini application 47.1.2249.129326 for Android

CVE-2018-16135 6.5 - Medium - December 26, 2022

The Opera Mini application 47.1.2249.129326 for Android allows remote attackers to spoof the Location Permission dialog via a crafted web site.

Opera Mini for Android below 53.1 displays URL left-aligned in the address field

CVE-2021-23253 5.3 - Medium - January 11, 2021

Opera Mini for Android below 53.1 displays URL left-aligned in the address field. This allows a malicious attacker to craft a URL with a long domain name, e.g. www.safe.opera.com.attacker.com. With the URL being left-aligned, the user will only see the front part (e.g. www.safe.opera.com) The exact amount depends on the phone screen size but the attacker can craft a number of different domains and target different phones. Starting with version 53.1 Opera Mini displays long URLs with the top-level domain label aligned to the right of the address field which mitigates the issue.

URLs using javascript: have the protocol removed when pasted into the address bar to protect users

CVE-2020-6159 6.1 - Medium - December 23, 2020

URLs using javascript: have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.

XSS

Opera Touch for iOS before version 2.4.5 is vulnerable to an address bar spoofing attack

CVE-2020-6157 4.3 - Medium - November 13, 2020

Opera Touch for iOS before version 2.4.5 is vulnerable to an address bar spoofing attack. The vulnerability allows a malicious page to trick the browser into showing an address of a different page. This may allow the malicious page to impersonate another page and trick a user into providing sensitive data.

Opera through 53 on Android allows Address Bar Spoofing

CVE-2019-12278 4.3 - Medium - March 12, 2020

Opera through 53 on Android allows Address Bar Spoofing. Characters from several languages are displayed in Right-to-Left order, due to mishandling of several Unicode characters. The rendering mechanism, in conjunction with the "first strong character" concept, may improperly operate on a numerical IP address or an alphabetic string, leading to a spoofed URL.

Opera for Android before 54.0.2669.49432 is vulnerable to a sandboxed cross-origin iframe bypass attack

CVE-2019-19788 5.5 - Medium - December 18, 2019

Opera for Android before 54.0.2669.49432 is vulnerable to a sandboxed cross-origin iframe bypass attack. By using a service working inside a sandboxed iframe it is possible to bypass the normal sandboxing attributes. This allows an attacker to make forced redirections without any user interaction from a third-party context.

Opera Mini for Android

CVE-2019-18624 9.8 - Critical - October 29, 2019

Opera Mini for Android allows attackers to bypass intended restrictions on .apk file download/installation via an RTLO (aka Right to Left Override) approach, as demonstrated by misinterpretation of malicious%E2%80%AEtxt.apk as maliciouskpa.txt. This affects 44.1.2254.142553, 44.1.2254.142659, and 44.1.2254.143214.

Improper Input Validation

The Opera Mini application through 16.0.14 for iOS has a UXSS vulnerability

CVE-2019-13607 6.1 - Medium - July 18, 2019

The Opera Mini application through 16.0.14 for iOS has a UXSS vulnerability that can be triggered by performing navigation to a javascript: URL.

XSS

In the WebRTC component in Opera 51.0.2830.55, after visiting a web site

CVE-2018-6608 4.3 - Medium - March 28, 2018

In the WebRTC component in Opera 51.0.2830.55, after visiting a web site that attempts to gather complete client information (such as https://ip.voidsec.com), the browser can disclose a private IP address in a STUN request.

Information Disclosure

Opera Mini 13 and Opera Stable 36

CVE-2016-4075 6.1 - Medium - April 21, 2017

Opera Mini 13 and Opera Stable 36 allow remote attackers to spoof the displayed URL via a crafted HTML document, related to the about:blank URL.

Open Redirect

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which

CVE-2015-4000 3.7 - Low - May 21, 2015

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

Cryptographic Issues

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code

CVE-2011-3389 - September 06, 2011

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

Inadequate Encryption Strength

Opera before 10.00 does not check all intermediate X.509 certificates for revocation, which makes it easier for remote SSL servers to bypass validation of the certificate chain

CVE-2009-3046 7.5 - High - September 02, 2009

Opera before 10.00 does not check all intermediate X.509 certificates for revocation, which makes it easier for remote SSL servers to bypass validation of the certificate chain via a revoked certificate.

Improper Certificate Validation

Opera, possibly 9.64 and earlier

CVE-2009-2540 - July 20, 2009

Opera, possibly 9.64 and earlier, allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.

Allocation of Resources Without Limits or Throttling

Opera before 9.64 allows remote attackers to conduct cross-domain scripting attacks

CVE-2009-0915 - March 16, 2009

Opera before 9.64 allows remote attackers to conduct cross-domain scripting attacks via unspecified vectors related to plug-ins.

XSS

Unspecified vulnerability in Opera before 9.5

CVE-2008-2716 - June 16, 2008

Unspecified vulnerability in Opera before 9.5 allows remote attackers to spoof the contents of trusted frames on the same parent page by modifying the location, which can facilitate phishing attacks.

Clickjacking

Opera 9 drops DNS pins based on failed connections to irrelevant TCP ports

CVE-2007-5276 - October 08, 2007

Opera 9 drops DNS pins based on failed connections to irrelevant TCP ports, which makes it easier for remote attackers to conduct DNS rebinding attacks, as demonstrated by a port 81 URL in an IMG SRC, when the DNS pin had been established for a session on port 80.

Opera before 9.23 allows remote attackers to execute arbitrary code via crafted Javascript

CVE-2007-4367 - August 15, 2007

Opera before 9.23 allows remote attackers to execute arbitrary code via crafted Javascript that triggers a "virtual function call on an invalid pointer."

Release of Invalid Pointer or Reference

Use-after-free vulnerability in the BitTorrent support in Opera before 9.22

CVE-2007-3929 - July 21, 2007

Use-after-free vulnerability in the BitTorrent support in Opera before 9.22 allows user-assisted remote attackers to execute arbitrary code via a crafted header in a torrent file, which leaves a dangling pointer to an invalid object.

Dangling pointer

Buffer overflow in the transfer manager in Opera before 9.21 for Windows

CVE-2007-2809 - May 22, 2007

Buffer overflow in the transfer manager in Opera before 9.21 for Windows allows user-assisted remote attackers to execute arbitrary code via a crafted torrent file. NOTE: due to the lack of details, it is not clear if this is the same issue as CVE-2007-2274.

Classic Buffer Overflow

The BitTorrent implementation in Opera 9.2

CVE-2007-2274 - April 25, 2007

The BitTorrent implementation in Opera 9.2 allows remote attackers to cause a denial of service (CPU consumption and application crash) via a malformed torrent file. NOTE: the original disclosure refers to this as a memory leak, but it is not certain.

Memory Leak

AcroPDF.DLL in Adobe Reader 8.0, when accessed from Mozilla Firefox, Netscape, or Opera, allows remote attackers to cause a denial of service (unspecified resource consumption) via a .pdf URL with an anchor identifier

CVE-2007-1377 - March 10, 2007

AcroPDF.DLL in Adobe Reader 8.0, when accessed from Mozilla Firefox, Netscape, or Opera, allows remote attackers to cause a denial of service (unspecified resource consumption) via a .pdf URL with an anchor identifier that begins with search= followed by many %n sequences, a different vulnerability than CVE-2006-6027 and CVE-2006-6236.

Resource Exhaustion

Mozilla Firefox 2.0.0.1

CVE-2007-0802 - February 07, 2007

Mozilla Firefox 2.0.0.1 allows remote attackers to bypass the Phishing Protection mechanism by adding certain characters to the end of the domain name, as demonstrated by the "." and "/" characters, which is not caught by the Phishing List blacklist filter.

Improper Input Validation

Opera 9 allows remote attackers to cause a denial of service (crash) via a crafted web page

CVE-2006-3353 - July 06, 2006

Opera 9 allows remote attackers to cause a denial of service (crash) via a crafted web page that triggers an out-of-bounds memory access, related to an iframe and JavaScript that accesses certain style sheets properties.

Buffer Overflow

Opera before 9.0 does not reset the SSL security bar after displaying a download dialog from an SSL-enabled website, which

CVE-2006-3331 - June 30, 2006

Opera before 9.0 does not reset the SSL security bar after displaying a download dialog from an SSL-enabled website, which allows remote attackers to spoof a trusted SSL certificate from an untrusted website and facilitates phishing attacks.

Opera 9 allows remote attackers to cause a denial of service (crash)

CVE-2006-3199 - June 23, 2006

Opera 9 allows remote attackers to cause a denial of service (crash) via an A tag with an href attribute with a URL containing a long hostname, which triggers an out-of-bounds operation.

Buffer Overflow

Integer overflow in Opera 8.54 and earlier

CVE-2006-3198 - June 23, 2006

Integer overflow in Opera 8.54 and earlier allows remote attackers to execute arbitrary code via a JPEG image with large height and width values, which causes less memory to be allocated than intended.

Integer Overflow or Wraparound

Opera 8.02 and earlier

CVE-2005-4718 - December 31, 2005

Opera 8.02 and earlier allows remote attackers to cause a denial of service (client crash) via (1) a crafted HTML file with a "content: url(0);" style attribute, a "bodyA" tag, a long string, and a "u" tag with a long attribute, as demonstrated by opera.html; and (2) a BGSOUND element with a "margin:-99;" STYLE attribute.

Opera before 8.51, when running on Windows with Input Method Editor (IME) installed

CVE-2005-4210 - December 13, 2005

Opera before 8.51, when running on Windows with Input Method Editor (IME) installed, allows remote attackers to cause a denial of service (persistent application crash) by bookmarking a site with a long title.

Opera 8.50 allows remote attackers to cause a denial of service (crash)

CVE-2005-3946 - December 01, 2005

Opera 8.50 allows remote attackers to cause a denial of service (crash) via a Java applet with a large string argument to the removeMember JNI method for the com.opera.JSObject class.

Improper Input Validation

Opera before 8.51 on Linux and Unix systems allows remote attackers to execute arbitrary code via shell metacharacters (backticks) in a URL

CVE-2005-3750 - November 22, 2005

Opera before 8.51 on Linux and Unix systems allows remote attackers to execute arbitrary code via shell metacharacters (backticks) in a URL that another product provides in a command line argument when launching Opera.

Injection

Opera Web Browser 8.50 and 8.0 through 8.0.2

CVE-2005-3699 - November 21, 2005

Opera Web Browser 8.50 and 8.0 through 8.0.2 allows remote attackers to spoof the URL in the status bar via the title in an image in a link to a trusted site within a form to the malicious site.

Unspecified "drag-and-drop vulnerability" in Opera Web Browser before 8.50 on Windows allows "unintentional file uploads

CVE-2005-3041 - September 22, 2005

Unspecified "drag-and-drop vulnerability" in Opera Web Browser before 8.50 on Windows allows "unintentional file uploads."

Opera before 8.50 allows remote attackers to spoof the content type of files via a filename with a trailing "

CVE-2005-3007 - September 21, 2005

Opera before 8.50 allows remote attackers to spoof the content type of files via a filename with a trailing "." (dot), which might allow remote attackers to trick users into processing dangerous content.

Injection

A design error in Opera 8.01 and earlier

CVE-2005-2407 - August 01, 2005

A design error in Opera 8.01 and earlier allows user-assisted attackers to execute arbitrary code by overlaying a malicious new window above a file download dialog box, then tricking the user into double-clicking on the "Run" button, aka "link hijacking".

Clickjacking

Opera 8.01 allows remote attackers to conduct cross-site scripting (XSS) attacks or modify which files are uploaded by tricking a user into dragging an image

CVE-2005-2406 - August 01, 2005

Opera 8.01 allows remote attackers to conduct cross-site scripting (XSS) attacks or modify which files are uploaded by tricking a user into dragging an image that is a "javascript:" URI.

XSS

Opera 8.01, when the "Arial Unicode MS" font (ARIALUNI.TTF) is installed, does not properly handle extended ASCII characters in the file download dialog box, which

CVE-2005-2405 - August 01, 2005

Opera 8.01, when the "Arial Unicode MS" font (ARIALUNI.TTF) is installed, does not properly handle extended ASCII characters in the file download dialog box, which allows remote attackers to spoof file extensions and possibly trick users into executing arbitrary code.

Improper Input Validation

Opera 8.01 allows remote attackers to cause a denial of service (CPU consumption)

CVE-2005-2309 - July 19, 2005

Opera 8.01 allows remote attackers to cause a denial of service (CPU consumption) via a crafted JPEG image, as demonstrated using random.jpg.

Resource Exhaustion

Opera 7.x and 8 before 8.01 does not clearly associate a Javascript dialog box with the web page

CVE-2005-2273 - July 13, 2005

Opera 7.x and 8 before 8.01 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."

Cross-site scripting (XSS) vulnerability in Opera 8.0 Final Build 1095

CVE-2005-1669 - June 16, 2005

Cross-site scripting (XSS) vulnerability in Opera 8.0 Final Build 1095 allows remote attackers to inject arbitrary web script or HTML via "javascript:" URLs when a new window or frame is opened, which allows remote attackers to bypass access restrictions and perform unauthorized actions on other domains.

XSS

The XMLHttpRequest object in Opera 8.0 Final Build 1095

CVE-2005-1475 - June 16, 2005

The XMLHttpRequest object in Opera 8.0 Final Build 1095 allows remote attackers to bypass access restrictions and perform unauthorized actions on other domains via a redirect.

Open Redirect

Opera 7.54 and earlier on Gentoo Linux uses an insecure path for plugins, which could

CVE-2005-0457 - May 02, 2005

Opera 7.54 and earlier on Gentoo Linux uses an insecure path for plugins, which could allow local users to gain privileges by inserting malicious libraries into the PORTAGE_TMPDIR (portage) temporary directory.

DLL preloading

The International Domain Name (IDN) support in Opera 7.54 allows remote attackers to spoof domain names using punycode encoded domain names

CVE-2005-0235 - May 02, 2005

The International Domain Name (IDN) support in Opera 7.54 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.

The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names

CVE-2005-0238 - May 02, 2005

The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.

Opera 8 Beta 3, when using first-generation vetted digital certificates, displays the Organizational information of an SSL certificate

CVE-2005-1139 - April 14, 2005

Opera 8 Beta 3, when using first-generation vetted digital certificates, displays the Organizational information of an SSL certificate, which is easily spoofed and can facilitate phishing attacks.

The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names

CVE-2005-0233 - February 08, 2005

The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.

Opera 7.54 and earlier does not properly validate base64 encoded binary data in a data: (RFC 2397) URL, which causes the URL to be obscured in a download dialog, which may

CVE-2005-0456 - January 12, 2005

Opera 7.54 and earlier does not properly validate base64 encoded binary data in a data: (RFC 2397) URL, which causes the URL to be obscured in a download dialog, which may allow remote attackers to trick users into executing arbitrary code.

Opera 7.x up to 7.54, and possibly other versions

CVE-2004-1157 - January 10, 2005

Opera 7.x up to 7.54, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.

Injection

Opera 7.54 allows remote attackers to cause a denial of service (application crash from memory exhaustion), as demonstrated using Javascript code

CVE-2004-1201 - January 10, 2005

Opera 7.54 allows remote attackers to cause a denial of service (application crash from memory exhaustion), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays.

Resource Exhaustion

Opera 7.54 and earlier does not properly limit an applet's access to internal Java packages from Sun, which

CVE-2004-1489 - December 31, 2004

Opera 7.54 and earlier does not properly limit an applet's access to internal Java packages from Sun, which allows remote attackers to gain sensitive information, such as user names and the installation directory.

Exposure of Resource to Wrong Sphere

Opera 7.54 and earlier

CVE-2004-1490 - December 31, 2004

Opera 7.54 and earlier allows remote attackers to spoof file types in the download dialog via dots and non-breaking spaces (ASCII character code 160) in the (1) Content-Disposition or (2) Content-Type headers.

Opera 7.54 and earlier uses kfmclient exec to handle unknown MIME types, which allows remote attackers to execute arbitrary code via a shortcut or launcher

CVE-2004-1491 - December 31, 2004

Opera 7.54 and earlier uses kfmclient exec to handle unknown MIME types, which allows remote attackers to execute arbitrary code via a shortcut or launcher that contains an Exec entry.

The Javascript engine in Opera 7.23 allows remote attackers to cause a denial of service (crash) by creating a new Array object with a large size value, then writing into

CVE-2004-1810 - December 31, 2004

The Javascript engine in Opera 7.23 allows remote attackers to cause a denial of service (crash) by creating a new Array object with a large size value, then writing into that array.

Opera Browser 7.23, and other versions before 7.50, updates the address bar as soon as the user clicks a link, which

CVE-2004-2260 - December 31, 2004

Opera Browser 7.23, and other versions before 7.50, updates the address bar as soon as the user clicks a link, which allows remote attackers to redirect to other sites via the onUnload attribute.

Open Redirect

A race condition in Opera web browser 7.53 Build 3850 causes Opera to fill in the address bar before the page has been loaded, which

CVE-2004-2491 - December 31, 2004

A race condition in Opera web browser 7.53 Build 3850 causes Opera to fill in the address bar before the page has been loaded, which allows remote attackers to spoof the URL in the address bar via the window.open and location.replace HTML parameters, which facilitates phishing attacks.

Race Condition

Opera before 7.54 allows remote attackers to modify properties and methods of the location object and execute Javascript to read arbitrary files

CVE-2004-2570 - December 31, 2004

Opera before 7.54 allows remote attackers to modify properties and methods of the location object and execute Javascript to read arbitrary files from the client's local filesystem or display a false URL to the user.

Injection

Opera offers an Open button to verify

CVE-2004-2659 - December 31, 2004

Opera offers an Open button to verify that a user wishes to execute a downloaded file, which allows user-assisted remote attackers to construct a race condition that tricks a user into clicking Open via a request for a different mouse or keyboard action very shortly before the Open dialog appears. NOTE: this is a different issue than CVE-2005-2407.

Race Condition

Opera allows remote attackers to cause a denial of service (invalid memory reference and application crash) via a web page or HTML email

CVE-2004-1615 - October 18, 2004

Opera allows remote attackers to cause a denial of service (invalid memory reference and application crash) via a web page or HTML email that contains a TBODY tag with a large COL SPAN value, as demonstrated by mangleme.

Opera does not prevent cookies

CVE-2004-0872 - September 16, 2004

Opera does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."

Incorrect Resource Transfer Between Spheres

Opera 7.50 and earlier allows remote web sites to provide a "Shortcut Icon" (favicon)

CVE-2004-0537 - August 06, 2004

Opera 7.50 and earlier allows remote web sites to provide a "Shortcut Icon" (favicon) that is wider than expected, which could allow the web sites to spoof a trusted domain and facilitate phishing attacks using a wide icon and extra spaces.

Argument injection vulnerability in Opera before 7.50 does not properly filter "-" characters

CVE-2004-0473 - July 07, 2004

Argument injection vulnerability in Opera before 7.50 does not properly filter "-" characters that begin a hostname in a telnet URI, which allows remote attackers to insert options to the resulting command line and overwrite arbitrary files via (1) the "-f" option on Windows XP or (2) the "-n" option on Linux.

Argument Injection

Opera allows remote attackers to bypass intended cookie access restrictions on a web application

CVE-2003-0593 - April 15, 2004

Opera allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Opera to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.

Directory traversal

Opera Web Browser 7.0 through 7.23

CVE-2004-2083 - February 11, 2004

Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."

Buffer overflow in Opera 6.05 and 6.06, and possibly other versions

CVE-2003-1387 - December 31, 2003

Buffer overflow in Opera 6.05 and 6.06, and possibly other versions, allows remote attackers to execute arbitrary code via a URL with a long username.

Classic Buffer Overflow

Buffer overflow in Opera 7.02 Build 2668

CVE-2003-1388 - December 31, 2003

Buffer overflow in Opera 7.02 Build 2668 allows remote attackers to crash Opera via a long HTTP request ending in a .ZIP extension.

Classic Buffer Overflow

Heap-based buffer overflow in Opera 6.05 through 7.10

CVE-2003-1396 - December 31, 2003

Heap-based buffer overflow in Opera 6.05 through 7.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a filename with a long extension.

Memory Corruption

The PluginContext object of Opera 6.05 and 7.0 allows remote attackers to cause a denial of service (crash) via an HTTP request containing a long string

CVE-2003-1397 - December 31, 2003

The PluginContext object of Opera 6.05 and 7.0 allows remote attackers to cause a denial of service (crash) via an HTTP request containing a long string that gets passed to the ShowDocument method.

Buffer Overflow

Cross-site scripting (XSS) vulnerability in Opera 6.0 through 7.0 with automatic redirection disabled

CVE-2003-1420 - December 31, 2003

Cross-site scripting (XSS) vulnerability in Opera 6.0 through 7.0 with automatic redirection disabled allows remote attackers to inject arbitrary web script or HTML via the HTTP Location header.

XSS

Heap-based buffer overflow in Opera 7.11 and 7.20

CVE-2003-0870 - November 17, 2003

Heap-based buffer overflow in Opera 7.11 and 7.20 allows remote attackers to execute arbitrary code via an HREF with a large number of escaped characters in the server name.

Memory Corruption

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.