CVE-2008-4695 (GCVE-0-2008-4695)
Vulnerability from cvelistv5 – Published: 2008-10-23 21:00 – Updated: 2024-08-07 10:24
VLAI?
Summary
Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:24:20.981Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "31643",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/31643"
},
{
"name": "32394",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32394"
},
{
"name": "32538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32538"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/solaris/960/"
},
{
"name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2008/10/22/5"
},
{
"name": "1021017",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1021017"
},
{
"name": "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2008/10/21/5"
},
{
"name": "32177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32177"
},
{
"name": "opera-java-applets-information-disclosure(45723)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45723"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/windows/960/"
},
{
"name": "SUSE-SR:2008:022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/linux/960/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/mac/960/"
},
{
"name": "ADV-2008-2765",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2765"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/support/search/view/902/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/freebsd/960/"
},
{
"name": "GLSA-200811-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-10-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "31643",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/31643"
},
{
"name": "32394",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32394"
},
{
"name": "32538",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32538"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/solaris/960/"
},
{
"name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2008/10/22/5"
},
{
"name": "1021017",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1021017"
},
{
"name": "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2008/10/21/5"
},
{
"name": "32177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32177"
},
{
"name": "opera-java-applets-information-disclosure(45723)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45723"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/windows/960/"
},
{
"name": "SUSE-SR:2008:022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/linux/960/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/mac/960/"
},
{
"name": "ADV-2008-2765",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2765"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/support/search/view/902/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/freebsd/960/"
},
{
"name": "GLSA-200811-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-4695",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "31643",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31643"
},
{
"name": "32394",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32394"
},
{
"name": "32538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32538"
},
{
"name": "http://www.opera.com/docs/changelogs/solaris/960/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/solaris/960/"
},
{
"name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/22/5"
},
{
"name": "1021017",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021017"
},
{
"name": "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/21/5"
},
{
"name": "32177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32177"
},
{
"name": "opera-java-applets-information-disclosure(45723)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45723"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/960/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/960/"
},
{
"name": "SUSE-SR:2008:022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
},
{
"name": "http://www.opera.com/docs/changelogs/linux/960/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/linux/960/"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/960/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/960/"
},
{
"name": "ADV-2008-2765",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2765"
},
{
"name": "http://www.opera.com/support/search/view/902/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/search/view/902/"
},
{
"name": "http://www.opera.com/docs/changelogs/freebsd/960/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/freebsd/960/"
},
{
"name": "GLSA-200811-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-4695",
"datePublished": "2008-10-23T21:00:00",
"dateReserved": "2008-10-22T00:00:00",
"dateUpdated": "2024-08-07T10:24:20.981Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2008-4695\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-10-23T22:00:01.403\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context.\"},{\"lang\":\"es\",\"value\":\"Opera versiones anteriores a v9.60 permite a atacantes remotos obtener informaci\u00f3n sensible y tener otros impactos desconocidos prediciendo la ruta de la cach\u00e9 de un applet de Java cacheado y entonces lanzar este applet desde la cach\u00e9, llevando a cabo la ejecuci\u00f3n del applet dentro del contexto de la m\u00e1quina local.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:*:beta_1:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.60\",\"matchCriteriaId\":\"76CE040A-2200-48A9-946C-083649A1E681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F071C3F7-A3C4-475D-8843-B52F2DB7C56D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CBC39B3-4106-4B28-8AFB-4F4B5B5119D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"763CEF7F-AAB2-4C16-BDC2-E5F864111592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B66F0EC7-452C-4847-B028-5086FE657440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F966486-485B-4B0D-9BE1-F1D39CB08863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32E4272-6CEF-4C1C-BDA2-96863E8301DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B21D05-A906-44B5-AEDA-73D383B905E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0BA115B-C42E-4794-90BC-778B0C85CE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C0F2643-923D-4072-B5A4-6321066C3AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4500A623-BD2C-461A-B862-2C51BD25BE71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E77793-94BC-47D8-B2D1-D3B020DEF93C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0EC8D15-02D5-4988-85FD-50B1ABCC7B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF315DF-C0C9-468C-8C7E-C4547AF431FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"63114EE0-54F7-4418-9B9E-C37BB2869F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF5C9CB9-6396-415D-AC64-312F47A76177\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:beta_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8F3056A-14B5-411F-8FE8-80AF5605001D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF6B223-8575-40C7-9EDA-BDDCF6ABDBAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5159296-AD9C-4199-B5DF-539EE61D45A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE952E7C-EBDC-4652-95C3-C308BBEF1FAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE616514-882C-4ED2-BB0C-1248B8316ED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00A6FD59-C258-4A49-81C9-F6E58FB30117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADA8A93-4DF4-4C95-860E-65CA46B12DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9EF0387-AEFC-40BC-A7C8-28F175844CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1B176A-1200-4E75-BFC0-AA5F87E2AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"911B0336-02CE-426C-ABFF-8CFD3BC146CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5435A52-0F9D-41AC-9FF9-93A512D0103C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"790C5B0D-9A06-4C0C-BBBF-9B4C17857213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:beta_1v2:*:*:*:*:*:*\",\"matchCriteriaId\":\"620666CE-AABB-4A36-9566-425F2C810F55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD72F9AF-EFD5-408B-9FC3-6341F92B39B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2590789F-F333-4AD0-82B4-D6D9B9E0F5AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"355242B3-33ED-4B65-8373-3CDC6C556B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A685E97D-3B0F-4C69-8124-F3AB26905124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FDEC39-7B53-4AD9-9EDF-D95860264345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7F056E-BB13-4453-8065-C18E6171AC0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0221A7DE-9F8F-46A4-B609-1F10D2606370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.20:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3089B27-E279-46B8-91C3-2040DBEBC281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7433778F-DE4F-48A7-8AF7-8DBD17DC4C5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02178B82-3805-4B7C-B341-4F4E280B4DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA8888D-6CC5-4ED8-9907-0B9709F2980A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A860F7C-F2FF-40A9-88DA-35766836A8F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.50:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"47871B2C-F6DA-4C92-BA15-90BA8FE3F979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E2EA7B-19D5-4A6A-88BE-BEEEAA792536\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E50D780-F507-49BC-8C34-477C6A7C3741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476868D1-E4EA-4F9A-8282-0CE5BB574362\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA7025B-BBB5-43BC-AB6E-E41E56430AB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.54:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E33873C-DFD6-4450-8A9A-31CF2437E5FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.54:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D545A5-A8D9-4678-BB58-248B999AF4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00336594-FE61-4815-B52F-90BE545E9428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"262ADE2E-4E91-4BA3-AAAD-A1B3A18EAAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"587EBDA2-C0F1-469B-A9A9-68634CF058A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:beta_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EBC3851-2A2E-41E9-A6D0-D41334BF7C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCE749D-8553-4365-A8C5-A6C9037FEAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F2F078-9620-4ED1-BA42-44C167DEF2A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0B61DF6-755B-44D1-88C2-F3EF33BD6183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A006AB3D-3228-4980-A45C-F331E8236867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"625DF977-9C3A-4904-BF77-DE1CE7C9AA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5C0B1FD-140F-43BF-963F-55C6929DE68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"244D2B12-5C3A-4007-B93C-0194417C00A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEDD65A0-57AA-4374-AF0D-EBE7B6F4A3CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C64664-5B10-48E4-A457-56DBC8EB30D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC34889-5A1F-4763-995E-67EE06EFB817\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85AD3AC7-F403-4A80-B56B-D32DF61A708A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADC950D-2542-43B3-BC71-FFE3AD76E29B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62EFDBC5-7ADB-4F66-8F0A-B234FC9C9B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B57ECE1A-72DE-4E9C-B762-2935A964277F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.20:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D2E44B-7DD4-4C41-BCCB-4B6F1D7DE171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C204EE-8435-4CCA-B08C-60E702441AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64166ABD-39BA-482C-BCA5-44468105E8BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B766176F-E80A-433A-AC30-1A1265FCDE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC06019-8CF0-4F01-8A63-853FB3F60185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E09E20-40D5-4166-B870-5954339E176D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E751386F-0179-4BE7-9F46-66455EAFB1A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7D9843-8967-4E36-9609-4497EECB2842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F85686-88F9-412C-9105-F94D4D4D61FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.50:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1646DDF9-C217-4EF6-83D0-8F0CB2A16E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.50:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DDD7BF-9265-4202-93C1-98FAEC336190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"089A088C-6DAE-4335-AD14-DACE64641A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB8DBBA4-B5A1-41FC-9E09-7D2397383C49\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32177\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32394\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32538\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200811-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1021017\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/21/5\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/22/5\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/freebsd/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/mac/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/solaris/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/windows/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/support/search/view/902/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/31643\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2765\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45723\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32538\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200811-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1021017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/21/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/22/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/freebsd/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/mac/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/solaris/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/windows/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/support/search/view/902/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/31643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2765\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…