Heap-based buffer overflow in Opera 9.0 and 9.01 allows remote attackers to execute arbitrary code via a long URL in a tag (long link address).
Max CVSS
5.1
EPSS Score
29.94%
Published
2006-10-17
Updated
2017-07-20
The CSS functionality in Opera 9 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) by setting the background property of a DHTML element to a long http or https URL, which triggers memory corruption.
Max CVSS
5.0
EPSS Score
0.71%
Published
2006-07-31
Updated
2022-02-28
Opera 9 allows remote attackers to cause a denial of service (crash) via a crafted web page that triggers an out-of-bounds memory access, related to an iframe and JavaScript that accesses certain style sheets properties.
Max CVSS
5.0
EPSS Score
1.63%
Published
2006-07-06
Updated
2022-02-28
Opera before 9.0 does not reset the SSL security bar after displaying a download dialog from an SSL-enabled website, which allows remote attackers to spoof a trusted SSL certificate from an untrusted website and facilitates phishing attacks.
Max CVSS
5.0
EPSS Score
1.69%
Published
2006-06-30
Updated
2022-02-28
Opera 9 allows remote attackers to cause a denial of service (crash) via an A tag with an href attribute with a URL containing a long hostname, which triggers an out-of-bounds operation.
Max CVSS
5.0
EPSS Score
2.95%
Published
2006-06-23
Updated
2022-02-28
Integer overflow in Opera 8.54 and earlier allows remote attackers to execute arbitrary code via a JPEG image with large height and width values, which causes less memory to be allocated than intended.
Max CVSS
7.5
EPSS Score
8.58%
Published
2006-06-23
Updated
2022-02-28
Integer signedness error in Opera before 8.54 allows remote attackers to execute arbitrary code via long values in a stylesheet attribute, which pass a length check. NOTE: a sign extension problem makes the attack easier with shorter strings.
Max CVSS
5.1
EPSS Score
9.46%
Published
2006-04-19
Updated
2018-10-18
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!