CVE-2007-0127
https://notcve.org/view.php?id=CVE-2007-0127
The Javascript SVG support in Opera before 9.10 does not properly validate object types in a createSVGTransformFromMatrix request, which allows remote attackers to execute arbitrary code via JavaScript code that uses an invalid object in this request that causes a controlled pointer to be referenced during the virtual function call. El soporte para Javascript SVG en Opera anterior a 9.10 no valida adecuadamente los tipos de objeto en una petición createSVGTransformFromMatrix, lo cual permite a atacantes remotos ejecutar código de su elección mediante código JavaScript que utiliza un objeto inválido en esta petición que provoca que un puntero controlado sea referenciado durante la llamada a la función virtual. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=458 http://lists.suse.com/archive/suse-security-announce/2007-Jan/0009.html http://osvdb.org/31575 http://secunia.com/advisories/23613 http://secunia.com/advisories/23739 http://secunia.com/advisories/23771 http://securitytracker.com/id?1017473 http://www.gentoo.org/security/en/glsa/glsa-200701-08.xml http://www.opera.com/support/search/supsearch.dml?index=851 http://www.vupen.com/english/advisories/2007/0 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-4819
https://notcve.org/view.php?id=CVE-2006-4819
Heap-based buffer overflow in Opera 9.0 and 9.01 allows remote attackers to execute arbitrary code via a long URL in a tag (long link address). Desbordamiento de búfer basado en montículo en Opera 9.0 y 9.01 permite a atacantes remotos ejecutar código de su elección mediante una URL larga en una etiqueta (dirección de enlace larga). • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=424 http://secunia.com/advisories/22218 http://secunia.com/advisories/22509 http://securitytracker.com/id?1017080 http://www.kb.cert.org/vuls/id/484380 http://www.novell.com/linux/security/advisories/2006_61_opera.html http://www.opera.com/support/search/supsearch.dml?index=848 http://www.securityfocus.com/bid/20591 http://www.vupen.com/english/advisories/2006/4066 https://exchange.xforce.ibmcloud.com/vulnerabi • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-3945
https://notcve.org/view.php?id=CVE-2006-3945
The CSS functionality in Opera 9 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) by setting the background property of a DHTML element to a long http or https URL, which triggers memory corruption. La funcionalidad CSS en Opera 9 en Windows XP SP2 permite a atacantes remotos provocar una denegación de servicio (caída) estableciendo la propiedad background de un elemento DHTML con una URL http o https larga, lo cual provoca una corrupción de memoria. • http://browserfun.blogspot.com/2006/07/mobb-26-opera-css-background.html http://www.osvdb.org/27374 http://www.vupen.com/english/advisories/2006/2987 https://exchange.xforce.ibmcloud.com/vulnerabilities/27977 • CWE-787: Out-of-bounds Write •
CVE-2006-3199 – Opera 9 - long href Remote Denial of Service
https://notcve.org/view.php?id=CVE-2006-3199
Opera 9 allows remote attackers to cause a denial of service (crash) via an A tag with an href attribute with a URL containing a long hostname, which triggers an out-of-bounds operation. Opera v9 permite a atacantes remotos causar una denegación de servicio (caída) a través de un A tag con un atributo href con una URL que contiene un nombre de host grande, lo que provoca una operación fuera de rango. • https://www.exploit-db.com/exploits/1937 http://my.opera.com/community/forums/topic.dml?id=144635 http://securitytracker.com/id?1016359 http://www.critical.lt/?vuln/349 http://www.osvdb.org/27510 http://www.securityfocus.com/archive/1/437945/100/0/threaded http://www.securityfocus.com/archive/1/438326/100/0/threaded http://www.securityfocus.com/bid/18585 http://www.vupen.com/english/advisories/2006/2617 https://exchange.xforce.ibmcloud.com/vulnerabilities/27289 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2004-1491 – Opera Web Browser 7.54 - 'KDE KFMCLIENT' Remote Command Execution
https://notcve.org/view.php?id=CVE-2004-1491
Opera 7.54 and earlier uses kfmclient exec to handle unknown MIME types, which allows remote attackers to execute arbitrary code via a shortcut or launcher that contains an Exec entry. • https://www.exploit-db.com/exploits/24828 http://lists.suse.com/archive/suse-security-announce/2005-Mar/0007.html http://secunia.com/advisories/13447 http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml http://www.opera.com/linux/changelogs/754u2 http://www.securityfocus.com/bid/11901 http://www.zone-h.org/advisories/read/id=6503 https://exchange.xforce.ibmcloud.com/vulnerabilities/18457 •