CVE-2002-1091
https://notcve.org/view.php?id=CVE-2002-1091
Netscape 6.2.3 and earlier, and Mozilla 1.0.1, allow remote attackers to corrupt heap memory and execute arbitrary code via a GIF image with a zero width. • http://bugzilla.mozilla.org/show_bug.cgi?id=157989 http://crash.ihug.co.nz/~Sneuro/zerogif http://marc.info/?l=bugtraq&m=103134051120770&w=2 http://www.iss.net/security_center/static/10058.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:075 http://www.redhat.com/support/errata/RHSA-2002-192.html http://www.redhat.com/support/errata/RHSA-2003-046.html http://www.securityfocus.com/bid/5665 https://access.redhat.com/security/cve/CVE-2002-1091 h •
CVE-2002-0783 – Opera 5.12/6.0 - Frame Location Same Origin Policy Circumvention
https://notcve.org/view.php?id=CVE-2002-0783
Opera 6.01, 6.0, and 5.12 allows remote attackers to execute arbitrary JavaScript in the security context of other sites by setting the location of a frame or iframe to a Javascript: URL. • https://www.exploit-db.com/exploits/21451 http://archives.neohapsis.com/archives/bugtraq/2002-05/0117.html http://www.iss.net/security_center/static/9096.php http://www.securityfocus.com/bid/4745 •
CVE-2002-0243
https://notcve.org/view.php?id=CVE-2002-0243
Cross-site scripting vulnerability in Opera 6.0 and earlier allows remote attackers to execute arbitrary script via an Extended HTML Form, whose output from the remote server is not properly cleansed. Vulnerabilidad de secuencias de comandos en sitios cruzados en Internet Opera 6 y anteriores permite que atacante remotos ejecuten código arbitrario por medio de un formulario HTML extendido, cuya salida del servidor remoto no se ha aclarado adecuadamente. • http://marc.info/?l=bugtraq&m=101309907709138&w=2 •
CVE-2001-0898 – Opera 5.0/5.1 - Same Origin Policy Circumvention
https://notcve.org/view.php?id=CVE-2001-0898
Opera 6.0 and earlier allows remote attackers to access sensitive information such as cookies and links for other domains via Javascript that uses setTimeout to (1) access data after a new window to the domain has been opened or (2) access data via about:cache. • https://www.exploit-db.com/exploits/21156 http://marc.info/?l=bugtraq&m=100586079932284&w=2 http://marc.info/?l=bugtraq&m=100588139312696&w=2 http://www.iss.net/security_center/static/7567.php http://www.securityfocus.com/bid/3553 •