CVE-2008-4695 (GCVE-0-2008-4695)

Vulnerability from cvelistv5 – Published: 2008-10-23 21:00 – Updated: 2024-08-07 10:24
VLAI?
Summary
Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:24:20.981Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "31643",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31643"
          },
          {
            "name": "32394",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32394"
          },
          {
            "name": "32538",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32538"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/solaris/960/"
          },
          {
            "name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/10/22/5"
          },
          {
            "name": "1021017",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021017"
          },
          {
            "name": "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/10/21/5"
          },
          {
            "name": "32177",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32177"
          },
          {
            "name": "opera-java-applets-information-disclosure(45723)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45723"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/windows/960/"
          },
          {
            "name": "SUSE-SR:2008:022",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/linux/960/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/mac/960/"
          },
          {
            "name": "ADV-2008-2765",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2765"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/support/search/view/902/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/freebsd/960/"
          },
          {
            "name": "GLSA-200811-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "31643",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31643"
        },
        {
          "name": "32394",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32394"
        },
        {
          "name": "32538",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32538"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/solaris/960/"
        },
        {
          "name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/10/22/5"
        },
        {
          "name": "1021017",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021017"
        },
        {
          "name": "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/10/21/5"
        },
        {
          "name": "32177",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32177"
        },
        {
          "name": "opera-java-applets-information-disclosure(45723)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45723"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/windows/960/"
        },
        {
          "name": "SUSE-SR:2008:022",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/linux/960/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/mac/960/"
        },
        {
          "name": "ADV-2008-2765",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2765"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/support/search/view/902/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/freebsd/960/"
        },
        {
          "name": "GLSA-200811-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4695",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "31643",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31643"
            },
            {
              "name": "32394",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32394"
            },
            {
              "name": "32538",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32538"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/solaris/960/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/solaris/960/"
            },
            {
              "name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/10/22/5"
            },
            {
              "name": "1021017",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021017"
            },
            {
              "name": "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/10/21/5"
            },
            {
              "name": "32177",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32177"
            },
            {
              "name": "opera-java-applets-information-disclosure(45723)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45723"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/windows/960/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/windows/960/"
            },
            {
              "name": "SUSE-SR:2008:022",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/linux/960/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/linux/960/"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/mac/960/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/mac/960/"
            },
            {
              "name": "ADV-2008-2765",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2765"
            },
            {
              "name": "http://www.opera.com/support/search/view/902/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/support/search/view/902/"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/freebsd/960/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/freebsd/960/"
            },
            {
              "name": "GLSA-200811-01",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4695",
    "datePublished": "2008-10-23T21:00:00",
    "dateReserved": "2008-10-22T00:00:00",
    "dateUpdated": "2024-08-07T10:24:20.981Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-4695\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-10-23T22:00:01.403\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context.\"},{\"lang\":\"es\",\"value\":\"Opera versiones anteriores a v9.60 permite a atacantes remotos obtener informaci\u00f3n sensible y tener otros impactos desconocidos prediciendo la ruta de la cach\u00e9 de un applet de Java cacheado y entonces lanzar este applet desde la cach\u00e9, llevando a cabo la ejecuci\u00f3n del applet dentro del contexto de la m\u00e1quina local.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:*:beta_1:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.60\",\"matchCriteriaId\":\"76CE040A-2200-48A9-946C-083649A1E681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F071C3F7-A3C4-475D-8843-B52F2DB7C56D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CBC39B3-4106-4B28-8AFB-4F4B5B5119D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"763CEF7F-AAB2-4C16-BDC2-E5F864111592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B66F0EC7-452C-4847-B028-5086FE657440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F966486-485B-4B0D-9BE1-F1D39CB08863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32E4272-6CEF-4C1C-BDA2-96863E8301DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B21D05-A906-44B5-AEDA-73D383B905E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0BA115B-C42E-4794-90BC-778B0C85CE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C0F2643-923D-4072-B5A4-6321066C3AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4500A623-BD2C-461A-B862-2C51BD25BE71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E77793-94BC-47D8-B2D1-D3B020DEF93C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0EC8D15-02D5-4988-85FD-50B1ABCC7B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF315DF-C0C9-468C-8C7E-C4547AF431FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"63114EE0-54F7-4418-9B9E-C37BB2869F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF5C9CB9-6396-415D-AC64-312F47A76177\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:beta_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8F3056A-14B5-411F-8FE8-80AF5605001D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF6B223-8575-40C7-9EDA-BDDCF6ABDBAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5159296-AD9C-4199-B5DF-539EE61D45A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE952E7C-EBDC-4652-95C3-C308BBEF1FAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE616514-882C-4ED2-BB0C-1248B8316ED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00A6FD59-C258-4A49-81C9-F6E58FB30117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADA8A93-4DF4-4C95-860E-65CA46B12DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9EF0387-AEFC-40BC-A7C8-28F175844CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1B176A-1200-4E75-BFC0-AA5F87E2AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"911B0336-02CE-426C-ABFF-8CFD3BC146CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5435A52-0F9D-41AC-9FF9-93A512D0103C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"790C5B0D-9A06-4C0C-BBBF-9B4C17857213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:beta_1v2:*:*:*:*:*:*\",\"matchCriteriaId\":\"620666CE-AABB-4A36-9566-425F2C810F55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD72F9AF-EFD5-408B-9FC3-6341F92B39B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2590789F-F333-4AD0-82B4-D6D9B9E0F5AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"355242B3-33ED-4B65-8373-3CDC6C556B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A685E97D-3B0F-4C69-8124-F3AB26905124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FDEC39-7B53-4AD9-9EDF-D95860264345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7F056E-BB13-4453-8065-C18E6171AC0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0221A7DE-9F8F-46A4-B609-1F10D2606370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.20:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3089B27-E279-46B8-91C3-2040DBEBC281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7433778F-DE4F-48A7-8AF7-8DBD17DC4C5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02178B82-3805-4B7C-B341-4F4E280B4DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA8888D-6CC5-4ED8-9907-0B9709F2980A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A860F7C-F2FF-40A9-88DA-35766836A8F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.50:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"47871B2C-F6DA-4C92-BA15-90BA8FE3F979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E2EA7B-19D5-4A6A-88BE-BEEEAA792536\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E50D780-F507-49BC-8C34-477C6A7C3741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476868D1-E4EA-4F9A-8282-0CE5BB574362\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA7025B-BBB5-43BC-AB6E-E41E56430AB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.54:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E33873C-DFD6-4450-8A9A-31CF2437E5FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.54:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D545A5-A8D9-4678-BB58-248B999AF4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00336594-FE61-4815-B52F-90BE545E9428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"262ADE2E-4E91-4BA3-AAAD-A1B3A18EAAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"587EBDA2-C0F1-469B-A9A9-68634CF058A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:beta_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EBC3851-2A2E-41E9-A6D0-D41334BF7C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCE749D-8553-4365-A8C5-A6C9037FEAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F2F078-9620-4ED1-BA42-44C167DEF2A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0B61DF6-755B-44D1-88C2-F3EF33BD6183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A006AB3D-3228-4980-A45C-F331E8236867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"625DF977-9C3A-4904-BF77-DE1CE7C9AA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5C0B1FD-140F-43BF-963F-55C6929DE68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"244D2B12-5C3A-4007-B93C-0194417C00A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEDD65A0-57AA-4374-AF0D-EBE7B6F4A3CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C64664-5B10-48E4-A457-56DBC8EB30D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC34889-5A1F-4763-995E-67EE06EFB817\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85AD3AC7-F403-4A80-B56B-D32DF61A708A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADC950D-2542-43B3-BC71-FFE3AD76E29B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62EFDBC5-7ADB-4F66-8F0A-B234FC9C9B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B57ECE1A-72DE-4E9C-B762-2935A964277F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.20:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D2E44B-7DD4-4C41-BCCB-4B6F1D7DE171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C204EE-8435-4CCA-B08C-60E702441AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64166ABD-39BA-482C-BCA5-44468105E8BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B766176F-E80A-433A-AC30-1A1265FCDE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC06019-8CF0-4F01-8A63-853FB3F60185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E09E20-40D5-4166-B870-5954339E176D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E751386F-0179-4BE7-9F46-66455EAFB1A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7D9843-8967-4E36-9609-4497EECB2842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F85686-88F9-412C-9105-F94D4D4D61FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.50:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1646DDF9-C217-4EF6-83D0-8F0CB2A16E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.50:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DDD7BF-9265-4202-93C1-98FAEC336190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"089A088C-6DAE-4335-AD14-DACE64641A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB8DBBA4-B5A1-41FC-9E09-7D2397383C49\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32177\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32394\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32538\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200811-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1021017\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/21/5\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/22/5\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/freebsd/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/mac/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/solaris/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/windows/960/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/support/search/view/902/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/31643\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2765\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45723\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32538\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200811-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1021017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/21/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/22/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/freebsd/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/mac/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/solaris/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/windows/960/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/support/search/view/902/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/31643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2765\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…