New 0-day vulnerability has been discovered in Opera, which can be utilised to gain control of a user’s system. The vulnerability is known to affect Opera 10.10 and Opera 10.50 for Windows (other versions may be affected too) and a proof of concept submitted by Marcin Ressel is available here.
Secunia has categorised the vulnerability as highly critical. Apparently, the issue is caused due to a buffer overflow error, which can be triggered by a malformed HTTP “Content-Length:” header. Successful exploitation of the vulnerability may permit the execution of arbitrary code on the user’s system.
At the moment, no solution is available for the exploit. Until Opera Software patches this vulnerability, all Opera users should be cautious while browsing untrusted websites.
Comment on This Post |
Tweet This |
Share on Facebook |
Save to Delicious |
Stumble This |
Digg This |
Reddit This
Don’t miss these Related Posts:
- Highly Critical Javascript Vulnerability Found in Firefox 3.5
- Opera 10.01 Released – Fixes Multiple Security Vulnerabilities
- Internet Explorer Vulnerability Causes Downloads of Firefox and Opera to Surge in Germany
- Critical Cross-Site Scripting Vulnerability Hits Twitter
- Opera 10.50 For Windows Released – A Worthy Challenger To Firefox And Chrome

Close on the heels of the release of 







On the eve of 




Mozilla was one of the first browsers to talk about native code compilation for JavaScript. In fact, this is what allowed Firefox and Chrome to zoom ahead of other browsers in terms of rendering speed. However, now that other browsers have also implemented similar features, Firefox has once again fallen behind.









