Filtered by vendor Opera
Subscribe
Total
311 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-0683 | 1 Opera | 1 Opera Browser | 2024-11-21 | 4.3 MEDIUM | N/A |
Opera before 11.01 does not properly restrict the use of opera: URLs, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site. | |||||
CVE-2011-0682 | 1 Opera | 1 Opera Browser | 2024-11-21 | 9.3 HIGH | N/A |
Integer truncation error in opera.dll in Opera before 11.01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML form with a select element that contains a large number of children. | |||||
CVE-2011-0681 | 1 Opera | 1 Opera Browser | 2024-11-21 | 4.3 MEDIUM | N/A |
The Cascading Style Sheets (CSS) Extensions for XML implementation in Opera before 11.01 recognizes links to javascript: URLs in the -o-link property, which makes it easier for remote attackers to bypass CSS filtering via a crafted URL. | |||||
CVE-2011-0450 | 2 Microsoft, Opera | 2 Windows, Opera Browser | 2024-11-21 | 7.6 HIGH | N/A |
The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file. | |||||
CVE-2010-5227 | 1 Opera | 1 Opera | 2024-11-21 | 6.9 MEDIUM | N/A |
Untrusted search path vulnerability in Opera before 10.62 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .htm, .mht, .mhtml, .xht, .xhtm, or .xhtl file. NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-5072 | 1 Opera | 1 Opera Browser | 2024-11-21 | 5.0 MEDIUM | N/A |
The JavaScript implementation in Opera 10.5 does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method. | |||||
CVE-2010-5068 | 1 Opera | 1 Opera Browser | 2024-11-21 | 4.3 MEDIUM | N/A |
The Cascading Style Sheets (CSS) implementation in Opera 10.5 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document, a related issue to CVE-2010-2264. | |||||
CVE-2010-4587 | 2 Microsoft, Opera | 2 Windows, Opera Browser | 2024-11-21 | 9.3 HIGH | N/A |
Opera before 11.00 on Windows does not properly implement the Insecure Third Party Module warning message, which might make it easier for user-assisted remote attackers to have an unspecified impact via a crafted module. | |||||
CVE-2010-4586 | 1 Opera | 1 Opera Browser | 2024-11-21 | 10.0 HIGH | N/A |
The default configuration of Opera before 11.00 enables WebSockets functionality, which has unspecified impact and remote attack vectors, possibly a related issue to CVE-2010-4508. | |||||
CVE-2010-4585 | 1 Opera | 1 Opera Browser | 2024-11-21 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in the auto-update functionality in Opera before 11.00 allows remote attackers to cause a denial of service (application crash) by triggering an Opera Unite update. | |||||
CVE-2010-4584 | 1 Opera | 1 Opera Browser | 2024-11-21 | 2.6 LOW | N/A |
Opera before 11.00, when Opera Turbo is used, does not properly present information about problematic X.509 certificates on https web sites, which might make it easier for remote attackers to spoof trusted content via a crafted web site. | |||||
CVE-2010-4583 | 1 Opera | 1 Opera Browser | 2024-11-21 | 2.6 LOW | N/A |
Opera before 11.00, when Opera Turbo is enabled, does not display a page's security indication, which makes it easier for remote attackers to spoof trusted content via a crafted web site. | |||||
CVE-2010-4582 | 1 Opera | 1 Opera Browser | 2024-11-21 | 5.0 MEDIUM | N/A |
Opera before 11.00 does not properly handle security policies during updates to extensions, which might allow remote attackers to bypass intended access restrictions via unspecified vectors. | |||||
CVE-2010-4581 | 1 Opera | 1 Opera Browser | 2024-11-21 | 10.0 HIGH | N/A |
Unspecified vulnerability in Opera before 11.00 has unknown impact and attack vectors, related to "a high severity issue." | |||||
CVE-2010-4580 | 1 Opera | 1 Opera Browser | 2024-11-21 | 5.0 MEDIUM | N/A |
Opera before 11.00 does not clear WAP WML form fields after manual navigation to a new web site, which allows remote attackers to obtain sensitive information via an input field that has the same name as an input field on a previously visited web site. | |||||
CVE-2010-4579 | 1 Opera | 1 Opera Browser | 2024-11-21 | 5.0 MEDIUM | N/A |
Opera before 11.00 does not properly constrain dialogs to appear on top of rendered documents, which makes it easier for remote attackers to trick users into interacting with a crafted web site that spoofs the (1) security information dialog or (2) download dialog. | |||||
CVE-2010-4050 | 1 Opera | 1 Opera Browser | 2024-11-21 | 4.3 MEDIUM | N/A |
Opera before 10.63 allows remote attackers to cause a denial of service (memory corruption) by referencing an SVG document in an IMG element. | |||||
CVE-2010-4049 | 1 Opera | 1 Opera Browser | 2024-11-21 | 4.3 MEDIUM | N/A |
Opera before 10.63 allows remote attackers to cause a denial of service (application crash) via a Flash movie with a transparent Window Mode (aka wmode) property, which is not properly handled during navigation away from the containing HTML document. | |||||
CVE-2010-4048 | 1 Opera | 1 Opera Browser | 2024-11-21 | 4.3 MEDIUM | N/A |
Opera before 10.63 allows user-assisted remote web servers to cause a denial of service (application crash) by sending a redirect during the saving of a file. | |||||
CVE-2010-4047 | 1 Opera | 1 Opera Browser | 2024-11-21 | 4.3 MEDIUM | N/A |
Opera before 10.63 does not properly select the security context of JavaScript code associated with an error page, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site. |