Vulnerabilities (CVE)

Filtered by vendor Opera Subscribe
Filtered by product Opera Browser
Total 285 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2007-2022 2 Adobe, Opera 2 Flash Player, Opera Browser 2025-04-09 6.8 MEDIUM N/A
Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
CVE-2007-1563 1 Opera 1 Opera Browser 2025-04-09 6.8 MEDIUM N/A
The FTP protocol implementation in Opera 9.10 allows remote attackers to allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
CVE-2009-1234 1 Opera 1 Opera Browser 2025-04-09 4.3 MEDIUM N/A
Opera 9.64 allows remote attackers to cause a denial of service (application crash) via an XML document containing a long series of start-tags with no corresponding end-tags. NOTE: it was later reported that 9.52 is also affected.
CVE-2009-3265 1 Opera 1 Opera Browser 2025-04-09 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in Opera 9 and 10 allows remote attackers to inject arbitrary web script or HTML via a (1) RSS or (2) Atom feed, related to the rendering of the application/rss+xml content type as "scripted content." NOTE: the vendor reportedly considers this behavior a "design feature," not a vulnerability.
CVE-2008-1082 1 Opera 1 Opera Browser 2025-04-09 4.3 MEDIUM N/A
Opera before 9.26 allows remote attackers to "bypass sanitization filters" and conduct cross-site scripting (XSS) attacks via crafted attribute values in an XML document, which are not properly handled during DOM presentation.
CVE-2008-5682 1 Opera 1 Opera Browser 2025-04-09 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in Opera before 9.63 allows remote attackers to inject arbitrary web script or HTML via built-in XSLT templates.
CVE-2009-3045 1 Opera 1 Opera Browser 2025-04-09 5.0 MEDIUM N/A
Opera before 10.00 trusts root X.509 certificates signed with the MD2 algorithm, which makes it easier for man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted server certificate.
CVE-2008-4698 1 Opera 1 Opera Browser 2025-04-09 5.8 MEDIUM N/A
Opera before 9.61 does not properly block scripts during preview of a news feed, which allows remote attackers to create arbitrary new feed subscriptions and read the contents of arbitrary feeds.
CVE-2007-5274 3 Mozilla, Opera, Sun 5 Firefox, Opera Browser, Jdk and 2 more 2025-04-09 2.6 LOW N/A
Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273. NOTE: this is similar to CVE-2007-5232.
CVE-2009-0914 1 Opera 1 Opera Browser 2025-04-09 9.3 HIGH N/A
Opera before 9.64 allows remote attackers to execute arbitrary code via a crafted JPEG image that triggers memory corruption.
CVE-2008-2715 1 Opera 1 Opera Browser 2025-04-09 5.0 MEDIUM N/A
Unspecified vulnerability in Opera before 9.5 allows remote attackers to read cross-domain images via HTML CANVAS elements that use the images as patterns.
CVE-2009-2540 1 Opera 1 Opera Browser 2025-04-09 4.3 MEDIUM N/A
Opera, possibly 9.64 and earlier, allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692.
CVE-2009-3046 1 Opera 1 Opera Browser 2025-04-09 5.0 MEDIUM 7.5 HIGH
Opera before 10.00 does not check all intermediate X.509 certificates for revocation, which makes it easier for remote SSL servers to bypass validation of the certificate chain via a revoked certificate.
CVE-2007-6523 1 Opera 1 Opera Browser 2025-04-09 7.8 HIGH N/A
Algorithmic complexity vulnerability in Opera 9.50 beta and 9.x before 9.25 allows remote attackers to cause a denial of service (CPU consumption) via a crafted bitmap (BMP) file that triggers a large number of calculations and checks.
CVE-2008-4198 1 Opera 1 Opera Browser 2025-04-09 5.0 MEDIUM N/A
Opera before 9.52, when rendering an http page that has loaded an https page into a frame, displays a padlock icon and offers a security information dialog reporting a secure connection, which might allow remote attackers to trick a user into performing unsafe actions on the http page.
CVE-2008-4694 1 Opera 1 Opera Browser 2025-04-09 9.3 HIGH N/A
Unspecified vulnerability in Opera before 9.60 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a redirect that specifies a crafted URL.
CVE-2007-0126 1 Opera 1 Opera Browser 2025-04-09 9.3 HIGH N/A
Heap-based buffer overflow in Opera 9.02 allows remote attackers to execute arbitrary code via a JPEG file with an invalid number of index bytes in the Define Huffman Table (DHT) marker.
CVE-2008-4292 1 Opera 1 Opera Browser 2025-04-09 10.0 HIGH N/A
Opera before 9.52 does not check the CRL override upon encountering a certificate that lacks a CRL, which has unknown impact and attack vectors. NOTE: it is not clear whether this is a vulnerability, but the vendor included it in a security section of the advisory.
CVE-2008-4697 1 Opera 1 Opera Browser 2025-04-09 4.3 MEDIUM N/A
The Fast Forward feature in Opera before 9.61, when a page is located in a frame, executes a javascript: URL in the context of the outermost page instead of the page that contains this URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
CVE-2009-2063 1 Opera 1 Opera Browser 2025-04-09 6.8 MEDIUM N/A
Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.