CVE-2004-0473
https://notcve.org/view.php?id=CVE-2004-0473
Argument injection vulnerability in Opera before 7.50 does not properly filter "-" characters that begin a hostname in a telnet URI, which allows remote attackers to insert options to the resulting command line and overwrite arbitrary files via (1) the "-f" option on Windows XP or (2) the "-n" option on Linux. El navegador Web Opera no filtra adecuadamente caractéres "-" en el comienzo de un nombre de máquina en una URI telnet, lo que permite a atacantes remotos insertar opciones en la linea de comandos resultante y sobreescribir ficheros de su elección mediante la opción "-f" en Windows XP o "-n" en Linux. • http://security.gentoo.org/glsa/glsa-200405-19.xml http://securitytracker.com/id?1010142 http://www.idefense.com/application/poi/display?id=104&type=vulnerabilities http://www.opera.com/linux/changelogs/750/index.dml http://www.securityfocus.com/bid/10341 https://exchange.xforce.ibmcloud.com/vulnerabilities/16139 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •
CVE-2003-0593
https://notcve.org/view.php?id=CVE-2003-0593
Opera allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Opera to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application. Opera permite a atacantes remotos saltarse las restriciones de cookies pretendidas en una aplicación web mediante secuencias de atravesamiento de directorios "%2e%2e" (punto punto codificado) en una URL, lo que hace que Opera envíe la cookie fuera de los subconjuntos de URL especificados, por ejemplo a una aplicación vulnerable que corre en el mismo servidor que la aplicación objetivo. • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2004-2083
https://notcve.org/view.php?id=CVE-2004-2083
Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing." • http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test http://secunia.com/advisories/10760 http://www.opera.com/docs/changelogs/windows/750b1 http://www.osvdb.org/3917 http://www.securityfocus.com/bid/9640 https://exchange.xforce.ibmcloud.com/vulnerabilities/21698 •
CVE-2003-1387 – Opera 6.0/7.0 - 'Username' URI Warning Dialog Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-1387
Buffer overflow in Opera 6.05 and 6.06, and possibly other versions, allows remote attackers to execute arbitrary code via a URL with a long username. • https://www.exploit-db.com/exploits/22239 http://securityreason.com/securityalert/3253 http://www.securityfocus.com/archive/1/311194 http://www.securityfocus.com/archive/1/315794 http://www.securityfocus.com/bid/6811 https://exchange.xforce.ibmcloud.com/vulnerabilities/11281 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2003-1396 – Opera 6.0.x/7.0 - Long File Name Remote Heap Corruption
https://notcve.org/view.php?id=CVE-2003-1396
Heap-based buffer overflow in Opera 6.05 through 7.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a filename with a long extension. • https://www.exploit-db.com/exploits/22550 http://archives.neohapsis.com/archives/bugtraq/2003-04/0346.html http://www.securityfocus.com/bid/7450 https://exchange.xforce.ibmcloud.com/vulnerabilities/11894 • CWE-787: Out-of-bounds Write •