Max CVSS | 7.5 | Min CVSS | 2.6 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2005-0457 | 7.2 |
Opera 7.54 and earlier on Gentoo Linux uses an insecure path for plugins, which could allow local users to gain privileges by inserting malicious libraries into the PORTAGE_TMPDIR (portage) temporary directory.
|
28-02-2022 - 18:51 | 02-05-2005 - 04:00 | |
CVE-2004-1157 | 7.5 |
Opera 7.x up to 7.54, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up wi
|
28-02-2022 - 18:38 | 10-01-2005 - 05:00 | |
CVE-2004-1491 | 5.0 |
Opera 7.54 and earlier uses kfmclient exec to handle unknown MIME types, which allows remote attackers to execute arbitrary code via a shortcut or launcher that contains an Exec entry.
|
28-02-2022 - 18:18 | 31-12-2004 - 05:00 | |
CVE-2004-1490 | 2.6 |
Opera 7.54 and earlier allows remote attackers to spoof file types in the download dialog via dots and non-breaking spaces (ASCII character code 160) in the (1) Content-Disposition or (2) Content-Type headers.
|
28-02-2022 - 18:15 | 31-12-2004 - 05:00 | |
CVE-2004-1489 | 2.6 |
Opera 7.54 and earlier does not properly limit an applet's access to internal Java packages from Sun, which allows remote attackers to gain sensitive information, such as user names and the installation directory.
|
28-02-2022 - 18:04 | 31-12-2004 - 05:00 | |
CVE-2005-0456 | 5.0 |
Opera 7.54 and earlier does not properly validate base64 encoded binary data in a data: (RFC 2397) URL, which causes the URL to be obscured in a download dialog, which may allow remote attackers to trick users into executing arbitrary code.
|
28-02-2022 - 17:41 | 12-01-2005 - 05:00 |