Page 40 of 223 results (0.008 seconds)

CVSS: 9.3EPSS: 16%CPEs: 94EXPL: 0

The Javascript SVG support in Opera before 9.10 does not properly validate object types in a createSVGTransformFromMatrix request, which allows remote attackers to execute arbitrary code via JavaScript code that uses an invalid object in this request that causes a controlled pointer to be referenced during the virtual function call. El soporte para Javascript SVG en Opera anterior a 9.10 no valida adecuadamente los tipos de objeto en una petición createSVGTransformFromMatrix, lo cual permite a atacantes remotos ejecutar código de su elección mediante código JavaScript que utiliza un objeto inválido en esta petición que provoca que un puntero controlado sea referenciado durante la llamada a la función virtual. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=458 http://lists.suse.com/archive/suse-security-announce/2007-Jan/0009.html http://osvdb.org/31575 http://secunia.com/advisories/23613 http://secunia.com/advisories/23739 http://secunia.com/advisories/23771 http://securitytracker.com/id?1017473 http://www.gentoo.org/security/en/glsa/glsa-200701-08.xml http://www.opera.com/support/search/supsearch.dml?index=851 http://www.vupen.com/english/advisories/2007/0 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 3

Opera 9 allows remote attackers to cause a denial of service (crash) via a crafted web page that triggers an out-of-bounds memory access, related to an iframe and JavaScript that accesses certain style sheets properties. Vulnerabilidad que permite a atacantes remotos causar una denegación de servicio (indisponibilidad de la aplicación) a través de una página web modificada maliciosamente que provoca accesos a memoria fuera de rango. Está relacionada con un iframe y con JavaScript que accede a determinadas propiedades de las hojas de estilo. • https://www.exploit-db.com/exploits/1972 http://echo.or.id/adv/adv35-y3dips-2006.txt http://securityreason.com/securityalert/1185 http://www.osvdb.org/27511 http://www.securityfocus.com/archive/1/438872/100/0/threaded http://www.securityfocus.com/bid/18758 https://exchange.xforce.ibmcloud.com/vulnerabilities/27531 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Opera before 9.0 does not reset the SSL security bar after displaying a download dialog from an SSL-enabled website, which allows remote attackers to spoof a trusted SSL certificate from an untrusted website and facilitates phishing attacks. Opera antes de la v9.0, no restaura la barra de seguridad SSL después de mostrar un diálogo de descarga de un sitio Web con SSL, lo que permite a atacantes remotos suplantar certificados SSL de confianza de un sitio web que no es de confianza y facilita los ataques de phishing. • http://secunia.com/advisories/19480 http://secunia.com/advisories/20897 http://secunia.com/secunia_research/2006-49/advisory http://securityreason.com/securityalert/1177 http://securitytracker.com/id?1016406 http://www.novell.com/linux/security/advisories/2006_38_opera.html http://www.securityfocus.com/archive/1/438634/100/0/threaded http://www.securityfocus.com/bid/18692 http://www.vupen.com/english/advisories/2006/2571 https://exchange.xforce.ibmcloud.com/vulnerabilities/27449 •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

Integer overflow in Opera 8.54 and earlier allows remote attackers to execute arbitrary code via a JPEG image with large height and width values, which causes less memory to be allocated than intended. Desbordamiento de entero en Opera v8.54 y anteriores permite a atacantes remotos ejecutar código de su elección a través de una imagen JPEG con medidas excesivas de ancho y largo, lo que provoca se reserve menos memoria de la que se requiere. • http://secunia.com/advisories/20787 http://secunia.com/advisories/20897 http://securityreason.com/securityalert/1133 http://securitytracker.com/id?1016362 http://www.novell.com/linux/security/advisories/2006_38_opera.html http://www.securityfocus.com/archive/1/438074/100/0/threaded http://www.securityfocus.com/bid/18594 http://www.vigilantminds.com/advi_detail.php?id=45 http://www.vupen.com/english/advisories/2006/2491 https://exchange.xforce.ibmcloud.com/vulnerabilities/27318 • CWE-190: Integer Overflow or Wraparound •

CVSS: 5.1EPSS: 9%CPEs: 88EXPL: 4

Integer signedness error in Opera before 8.54 allows remote attackers to execute arbitrary code via long values in a stylesheet attribute, which pass a length check. NOTE: a sign extension problem makes the attack easier with shorter strings. Error de entero sin signo en Opera en versiones anteriores a 8.54 permite a atacantes remotos ejecutar código arbitrario a través de valores largos en un atributo de la hoja de estilos, lo que pasa una verificación de longitud. NOTA: un problema de extensión de signo hace el ataque más fácil con cadenas cortas. • https://www.exploit-db.com/exploits/27641 http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html http://marc.info/?l=full-disclosure&m=114493114031891&w=2 http://secunia.com/advisories/20117 http://security.gentoo.org/glsa/glsa-200606-01.xml http://securitytracker.com/id?1015912 http://www.opera.com/docs/changelogs/windows/854 http://www.sec-consult.com/259.html http://www.securityfocus.com/archive/1/430876/100/0/threaded http://www.securityfocus.c • CWE-189: Numeric Errors •