Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context.
https://exchange.xforce.ibmcloud.com/vulnerabilities/45723
http://www.vupen.com/english/advisories/2008/2765
http://www.securityfocus.com/bid/31643
http://www.opera.com/support/search/view/902/
http://www.opera.com/docs/changelogs/windows/960/
http://www.opera.com/docs/changelogs/solaris/960/
http://www.opera.com/docs/changelogs/mac/960/
http://www.opera.com/docs/changelogs/linux/960/
http://www.opera.com/docs/changelogs/freebsd/960/
http://www.openwall.com/lists/oss-security/2008/10/22/5
http://www.openwall.com/lists/oss-security/2008/10/21/5
http://securitytracker.com/id?1021017
http://security.gentoo.org/glsa/glsa-200811-01.xml
http://secunia.com/advisories/32538
http://secunia.com/advisories/32394
http://secunia.com/advisories/32177
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html