Soldato
- Joined
- 7 Mar 2005
- Posts
- 19,636
- Location
- LU7
Just released today. Seems to be a security update. 
http://www.opera.com/browser/
http://my.opera.com/desktopteam/blog/
http://www.filehippo.com/download_opera/

http://www.opera.com/browser/
http://my.opera.com/desktopteam/blog/
http://www.filehippo.com/download_opera/
Changelog
Opera 9.63 is a recommended security upgrade. Please see the Security section.
Opera 9.63 incorporates the Opera Presto 2.1.1 user agent engine.
Changes since Opera 9.62
Security
* Manipulating text input contents can allow execution of arbitrary code, as reported by Red XIII. See our advisory.
* HTML parsing flaw can cause Opera to execute arbitrary code, as reported by Alexios Fakos. See our advisory.
* Long hostnames in file: URLs can cause execution of arbitrary code, as reported by Vitaly McLain. see our advisory.
* Script injection in feed preview can reveal contents of unrelated news feeds, as reported by David Bloom. See our advisory.
* Built-in XSLT templates can allow cross-site scripting, as reported by Robert Swiecki of the Google Security Team. See our advisory.
* Fixed an issue that could reveal random data, as reported by Matthew of Hispasec Sistemas. Details will be disclosed at a later date.
* SVG images embedded using tags can no longer execute Java or plugin content, suggested by Chris Evans.