Page 59 of 297 results (0.004 seconds)

CVSS: 7.5EPSS: 3%CPEs: 6EXPL: 3

Opera 6.01, 6.0, and 5.12 allows remote attackers to execute arbitrary JavaScript in the security context of other sites by setting the location of a frame or iframe to a Javascript: URL. • https://www.exploit-db.com/exploits/21451 http://archives.neohapsis.com/archives/bugtraq/2002-05/0117.html http://www.iss.net/security_center/static/9096.php http://www.securityfocus.com/bid/4745 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Opera, when configured with the "Determine action by MIME type" option disabled, interprets an object as an HTML document even when its MIME Content-Type is text/plain, which could allow remote attackers to execute arbitrary script in documents that the user does not expect, possibly through web applications that use a text/plain type to prevent cross-site scripting attacks. • http://marc.info/?l=bugtraq&m=101363764421623&w=2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting vulnerability in Opera 6.0 and earlier allows remote attackers to execute arbitrary script via an Extended HTML Form, whose output from the remote server is not properly cleansed. Vulnerabilidad de secuencias de comandos en sitios cruzados en Internet Opera 6 y anteriores permite que atacante remotos ejecuten código arbitrario por medio de un formulario HTML extendido, cuya salida del servidor remoto no se ha aclarado adecuadamente. • http://marc.info/?l=bugtraq&m=101309907709138&w=2 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

Opera 5.11 allows remote attackers to cause a denial of service (CPU consumption and memory leak) via a web page with a large number of images. • https://www.exploit-db.com/exploits/21181 http://www.securityfocus.com/archive/1/245152 http://www.securityfocus.com/bid/3684 https://exchange.xforce.ibmcloud.com/vulnerabilities/7709 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 1

Opera 6.0 and earlier allows remote attackers to access sensitive information such as cookies and links for other domains via Javascript that uses setTimeout to (1) access data after a new window to the domain has been opened or (2) access data via about:cache. • https://www.exploit-db.com/exploits/21156 http://marc.info/?l=bugtraq&m=100586079932284&w=2 http://marc.info/?l=bugtraq&m=100588139312696&w=2 http://www.iss.net/security_center/static/7567.php http://www.securityfocus.com/bid/3553 •