Vulnerabilities (CVE)

Filtered by vendor Opera Subscribe
Filtered by product Opera Browser
Total 285 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2004-0872 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
Opera does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."
CVE-2005-0235 1 Opera 1 Opera Browser 2025-04-03 5.0 MEDIUM N/A
The International Domain Name (IDN) support in Opera 7.54 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
CVE-2006-1834 1 Opera 1 Opera Browser 2025-04-03 5.1 MEDIUM N/A
Integer signedness error in Opera before 8.54 allows remote attackers to execute arbitrary code via long values in a stylesheet attribute, which pass a length check. NOTE: a sign extension problem makes the attack easier with shorter strings.
CVE-2018-6608 1 Opera 1 Opera Browser 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
In the WebRTC component in Opera 51.0.2830.55, after visiting a web site that attempts to gather complete client information (such as https://ip.voidsec.com), the browser can disclose a private IP address in a STUN request.
CVE-2018-18913 2 Microsoft, Opera 2 Windows 7, Opera Browser 2024-11-21 6.9 MEDIUM 7.8 HIGH
Opera before 57.0.3098.106 is vulnerable to a DLL Search Order hijacking attack where an attacker can send a ZIP archive composed of an HTML page along with a malicious DLL to the target. Once the document is opened, it may allow the attacker to take full control of the system from any location within the system. The issue lies in the loading of the shcore.dll and dcomp.dll files: these files are being searched for by the program in the same system-wide directory where the HTML file is executed.