Filtered by vendor Opera
Subscriptions
Total
311 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2012-3555 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 11.65 does not ensure that keyboard sequences are associated with a visible window, which makes it easier for user-assisted remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web site, related to a "hidden keyboard navigation" issue. | ||||
CVE-2012-1931 | 2 Opera, Unix | 2 Opera Browser, Unix | 2024-11-21 | N/A |
Opera before 11.62 on UNIX, when used in conjunction with an unspecified printing application, allows local users to overwrite arbitrary files via a symlink attack on a temporary file during printing. | ||||
CVE-2012-1930 | 2 Opera, Unix | 2 Opera Browser, Unix | 2024-11-21 | N/A |
Opera before 11.62 on UNIX uses world-readable permissions for temporary files during printing, which allows local users to obtain sensitive information by reading these files. | ||||
CVE-2012-1929 | 2 Apple, Opera | 2 Mac Os X, Opera Browser | 2024-11-21 | N/A |
Opera before 11.62 on Mac OS X allows remote attackers to spoof the address field and security dialogs via crafted styling that causes page content to be displayed outside of the intended content area. | ||||
CVE-2012-1928 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 11.62 allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain. | ||||
CVE-2012-1927 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 11.62 allows remote attackers to spoof the address field by triggering the launch of a dialog window associated with a different domain. | ||||
CVE-2012-1926 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 11.62 allows remote attackers to bypass the Same Origin Policy via the (1) history.pushState and (2) history.replaceState functions in conjunction with cross-domain frames, leading to unintended read access to history.state information. | ||||
CVE-2012-1925 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 11.62 does not ensure that a dialog window is placed on top of content windows, which makes it easier for user-assisted remote attackers to trick users into downloading and executing arbitrary files via a download dialog located under other windows. | ||||
CVE-2012-1924 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 11.62 allows user-assisted remote attackers to trick users into downloading and executing arbitrary files via a small window for the download dialog. | ||||
CVE-2012-1251 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | ||||
CVE-2012-1003 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Multiple integer overflows in Opera 11.60 and earlier allow remote attackers to cause a denial of service (application crash) via a large integer argument to the (1) Int32Array, (2) Float32Array, (3) Float64Array, (4) Uint32Array, (5) Int16Array, or (6) ArrayBuffer function. NOTE: the vendor reportedly characterizes this as "a stability issue, not a security issue." | ||||
CVE-2011-4690 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera 11.60 and earlier does not prevent capture of data about the times of Same Origin Policy violations during IFRAME loading attempts, which makes it easier for remote attackers to determine whether a document exists in the browser cache via crafted JavaScript code. | ||||
CVE-2011-4687 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 11.60 allows remote attackers to cause a denial of service (CPU and memory consumption) via unspecified content on a web page, as demonstrated by a page under the cisco.com home page. | ||||
CVE-2011-4686 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Unspecified vulnerability in the Web Workers implementation in Opera before 11.60 allows remote attackers to cause a denial of service (application crash) via unknown vectors. | ||||
CVE-2011-4685 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Dragonfly in Opera before 11.60 allows remote attackers to cause a denial of service (application crash) via unspecified content on a web page, as demonstrated by forbes.com. | ||||
CVE-2011-4684 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 11.60 does not properly handle certificate revocation, which has unspecified impact and remote attack vectors related to "corner cases." | ||||
CVE-2011-4683 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Unspecified vulnerability in Opera before 11.60 has unknown impact and attack vectors, related to a "moderately severe issue." | ||||
CVE-2011-4682 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
The JavaScript engine in Opera before 11.60 does not properly implement the in operator, which allows remote attackers to bypass the Same Origin Policy via vectors related to variables on different web sites. | ||||
CVE-2011-4681 | 1 Opera | 1 Opera Browser | 2024-11-21 | N/A |
Opera before 11.60 does not properly consider the number of . (dot) characters that conventionally exist in domain names of different top-level domains, which allows remote attackers to bypass the Same Origin Policy by leveraging access to a different domain name in the same top-level domain, as demonstrated by the .no or .uk domain. | ||||
CVE-2011-3389 | 9 Canonical, Debian, Google and 6 more | 21 Ubuntu Linux, Debian Linux, Chrome and 18 more | 2024-11-21 | N/A |
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack. |