Vulnerabilities (CVE)

Filtered by vendor Opera Subscribe
Filtered by product Opera Browser
Total 285 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2005-1139 1 Opera 1 Opera Browser 2025-04-03 7.5 HIGH N/A
Opera 8 Beta 3, when using first-generation vetted digital certificates, displays the Organizational information of an SSL certificate, which is easily spoofed and can facilitate phishing attacks.
CVE-2004-1490 1 Opera 1 Opera Browser 2025-04-03 2.6 LOW N/A
Opera 7.54 and earlier allows remote attackers to spoof file types in the download dialog via dots and non-breaking spaces (ASCII character code 160) in the (1) Content-Disposition or (2) Content-Type headers.
CVE-2005-1669 1 Opera 1 Opera Browser 2025-04-03 6.8 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in Opera 8.0 Final Build 1095 allows remote attackers to inject arbitrary web script or HTML via "javascript:" URLs when a new window or frame is opened, which allows remote attackers to bypass access restrictions and perform unauthorized actions on other domains.
CVE-2005-4210 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
Opera before 8.51, when running on Windows with Input Method Editor (IME) installed, allows remote attackers to cause a denial of service (persistent application crash) by bookmarking a site with a long title.
CVE-2003-0870 1 Opera 1 Opera Browser 2025-04-03 7.5 HIGH N/A
Heap-based buffer overflow in Opera 7.11 and 7.20 allows remote attackers to execute arbitrary code via an HREF with a large number of escaped characters in the server name.
CVE-2005-3946 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
Opera 8.50 allows remote attackers to cause a denial of service (crash) via a Java applet with a large string argument to the removeMember JNI method for the com.opera.JSObject class.
CVE-2006-3945 2 Microsoft, Opera 2 Windows Xp, Opera Browser 2025-04-03 5.0 MEDIUM N/A
The CSS functionality in Opera 9 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) by setting the background property of a DHTML element to a long http or https URL, which triggers memory corruption.
CVE-2005-0235 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
The International Domain Name (IDN) support in Opera 7.54 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
CVE-2005-2406 1 Opera 1 Opera Browser 2025-04-03 4.3 MEDIUM N/A
Opera 8.01 allows remote attackers to conduct cross-site scripting (XSS) attacks or modify which files are uploaded by tricking a user into dragging an image that is a "javascript:" URI.
CVE-2004-0717 3 Linux, Microsoft, Opera 3 Linux Kernel, Windows, Opera Browser 2025-04-03 7.5 HIGH N/A
Opera 7.51 for Windows and 7.50 for Linux does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
CVE-2005-4718 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
Opera 8.02 and earlier allows remote attackers to cause a denial of service (client crash) via (1) a crafted HTML file with a "content: url(0);" style attribute, a "bodyA" tag, a long string, and a "u" tag with a long attribute, as demonstrated by opera.html; and (2) a BGSOUND element with a "margin:-99;" STYLE attribute.
CVE-2005-3699 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
Opera Web Browser 8.50 and 8.0 through 8.0.2 allows remote attackers to spoof the URL in the status bar via the title in an image in a link to a trusted site within a form to the malicious site.
CVE-2006-3198 1 Opera 1 Opera Browser 2025-04-03 7.5 HIGH N/A
Integer overflow in Opera 8.54 and earlier allows remote attackers to execute arbitrary code via a JPEG image with large height and width values, which causes less memory to be allocated than intended.
CVE-2004-0537 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
Opera 7.50 and earlier allows remote web sites to provide a "Shortcut Icon" (favicon) that is wider than expected, which could allow the web sites to spoof a trusted domain and facilitate phishing attacks using a wide icon and extra spaces.
CVE-2004-1201 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
Opera 7.54 allows remote attackers to cause a denial of service (application crash from memory exhaustion), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays.
CVE-2005-2405 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
Opera 8.01, when the "Arial Unicode MS" font (ARIALUNI.TTF) is installed, does not properly handle extended ASCII characters in the file download dialog box, which allows remote attackers to spoof file extensions and possibly trick users into executing arbitrary code.
CVE-2005-3750 1 Opera 1 Opera Browser 2025-04-03 7.5 HIGH N/A
Opera before 8.51 on Linux and Unix systems allows remote attackers to execute arbitrary code via shell metacharacters (backticks) in a URL that another product provides in a command line argument when launching Opera.
CVE-2004-2083 1 Opera 1 Opera Browser 2025-04-03 2.6 LOW N/A
Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
CVE-2005-0238 4 Gnome, Mozilla, Omnigroup and 1 more 5 Epiphany, Camino, Mozilla and 2 more 2025-04-03 5.0 MEDIUM N/A
The International Domain Name (IDN) support in Epiphany allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
CVE-2005-0233 4 Mozilla, Omnigroup, Opera and 1 more 6 Camino, Firefox, Mozilla and 3 more 2025-04-03 7.5 HIGH N/A
The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.