CVE-2008-4199
Vulnerability from cvelistv5
Published
2008-09-27 00:00
Modified
2024-08-07 10:08
Severity ?
Summary
Opera before 9.52 does not prevent use of links from web pages to feed source files on the local disk, which might allow remote attackers to determine the validity of local filenames via vectors involving "detection of JavaScript events and appropriate manipulation."
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=235298
cve@mitre.orghttp://secunia.com/advisories/31549Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32538Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200811-01.xml
cve@mitre.orghttp://securitytracker.com/id?1020722
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/09/19/2
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/09/24/4
cve@mitre.orghttp://www.opera.com/docs/changelogs/freebsd/952/
cve@mitre.orghttp://www.opera.com/docs/changelogs/linux/952/
cve@mitre.orghttp://www.opera.com/docs/changelogs/mac/952/
cve@mitre.orghttp://www.opera.com/docs/changelogs/solaris/952/
cve@mitre.orghttp://www.opera.com/docs/changelogs/windows/952/
cve@mitre.orghttp://www.opera.com/support/search/view/896/
cve@mitre.orghttp://www.securityfocus.com/bid/30768
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2416Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44557
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=235298
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31549Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32538Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200811-01.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1020722
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/19/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/24/4
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/docs/changelogs/freebsd/952/
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/docs/changelogs/linux/952/
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/docs/changelogs/mac/952/
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/docs/changelogs/solaris/952/
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/docs/changelogs/windows/952/
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/support/search/view/896/
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30768
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2416Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44557
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:08:34.916Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-2416",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2416"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/support/search/view/896/"
          },
          {
            "name": "32538",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32538"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/mac/952/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/solaris/952/"
          },
          {
            "name": "opera-feedsource-info-disclosure(44557)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44557"
          },
          {
            "name": "1020722",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020722"
          },
          {
            "name": "30768",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30768"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/windows/952/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/linux/952/"
          },
          {
            "name": "[oss-security] 20080923 Re: CVE request: Opera \u003c 9.52 multiple vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/09/24/4"
          },
          {
            "name": "[oss-security] 20080919 CVE request: Opera \u003c 9.52 multiple vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/09/19/2"
          },
          {
            "name": "31549",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31549"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=235298"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/freebsd/952/"
          },
          {
            "name": "GLSA-200811-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Opera before 9.52 does not prevent use of links from web pages to feed source files on the local disk, which might allow remote attackers to determine the validity of local filenames via vectors involving \"detection of JavaScript events and appropriate manipulation.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2008-2416",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2416"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/support/search/view/896/"
        },
        {
          "name": "32538",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32538"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/mac/952/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/solaris/952/"
        },
        {
          "name": "opera-feedsource-info-disclosure(44557)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44557"
        },
        {
          "name": "1020722",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020722"
        },
        {
          "name": "30768",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30768"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/windows/952/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/linux/952/"
        },
        {
          "name": "[oss-security] 20080923 Re: CVE request: Opera \u003c 9.52 multiple vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/09/24/4"
        },
        {
          "name": "[oss-security] 20080919 CVE request: Opera \u003c 9.52 multiple vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/09/19/2"
        },
        {
          "name": "31549",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31549"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=235298"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/freebsd/952/"
        },
        {
          "name": "GLSA-200811-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4199",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Opera before 9.52 does not prevent use of links from web pages to feed source files on the local disk, which might allow remote attackers to determine the validity of local filenames via vectors involving \"detection of JavaScript events and appropriate manipulation.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-2416",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2416"
            },
            {
              "name": "http://www.opera.com/support/search/view/896/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/support/search/view/896/"
            },
            {
              "name": "32538",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32538"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/mac/952/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/mac/952/"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/solaris/952/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/solaris/952/"
            },
            {
              "name": "opera-feedsource-info-disclosure(44557)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44557"
            },
            {
              "name": "1020722",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020722"
            },
            {
              "name": "30768",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30768"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/windows/952/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/windows/952/"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/linux/952/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/linux/952/"
            },
            {
              "name": "[oss-security] 20080923 Re: CVE request: Opera \u003c 9.52 multiple vulnerabilities",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/09/24/4"
            },
            {
              "name": "[oss-security] 20080919 CVE request: Opera \u003c 9.52 multiple vulnerabilities",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/09/19/2"
            },
            {
              "name": "31549",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31549"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=235298",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=235298"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/freebsd/952/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/freebsd/952/"
            },
            {
              "name": "GLSA-200811-01",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4199",
    "datePublished": "2008-09-27T00:00:00",
    "dateReserved": "2008-09-23T00:00:00",
    "dateUpdated": "2024-08-07T10:08:34.916Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.51\", \"matchCriteriaId\": \"C8ECEB59-5441-49AC-857E-10092DB86028\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CECFBC71-7814-4A24-A918-C593673727B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"57824075-E3F7-4B23-B4D6-8417C3147085\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE078F27-6FC1-466C-8331-A89F8B6FE0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B7673C9-C69E-4CD8-9AF4-57AA81B8038A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*\", \"matchCriteriaId\": \"5839EB88-DF5E-4AB0-899B-DF9F72F5F442\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E1865A4-E038-4A1C-877D-5A3CFA9576BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*\", \"matchCriteriaId\": \"93966A66-4332-4E76-9B1A-2BBF10AF0ACC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4F51D99-C77D-4DB6-8D4B-DF1CE9078543\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAA91E77-301C-48F6-9A57-D5FDCEF743BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C49DDEF-681C-4A34-9FF8-17249C42842D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF365891-F3FA-4740-94B2-01F85254A2F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E42B4261-C511-4F3A-8596-6BD4E343DC31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D2F38FE-7E98-48B2-B0B2-35312368B21F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"63687D75-860D-4A36-B6BB-45BD4268B6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"5120A672-FB60-4DC3-A171-102793C05835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD500741-CF39-4F0C-9F96-6CBDFF8973D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"359941FD-A5CE-43C1-AA76-C1B79BCB08C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9AC78A-CA47-476D-935E-67932BAB98A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E9662C-441F-4AB2-AC4C-30F31C32949A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8D681B3-73E6-4257-84B4-DE83F6D659B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BF4EF8B-18CA-417C-BA30-024EE25B6AE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9E5F2A5-F50F-4085-AB7D-8C91121A429A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E90912E-0CF8-404B-9E86-461497C65A5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E19DD71-9447-4946-931F-4866537C8BC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54075890-6E0C-4AB7-8BD5-2023419CC251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ABC3435-77CD-4591-8282-7ADA60225CF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91FA8A44-2CAF-4EE4-940F-0D09BD07FD39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7C35850-B79C-4EE4-A6F2-CC5D2304724B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B797C8-3290-4278-9D4B-A15A14FB8D3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFEC078C-A8F4-471B-A367-59A86B78590D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E10F658D-D2E4-4789-8172-F8842C3EEA05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81687D99-7444-4205-A7BE-992CC758675F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D75C4301-68E9-4A10-B9C5-711252BF629B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B147C1A-EA6C-40C8-A54A-96840A6FE9DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC690371-3326-421E-8BAC-14F48840671B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E20418A7-1FA7-45EF-99B5-12D283EA6CB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BE50982-8026-466C-9F51-867425C9986F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B85C5F65-B814-4BF5-AB43-D0CFFE8175A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD889EC7-E5D2-4137-B85C-86D7DB5CED27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"97452A26-7231-43BE-B70E-B8D05365CAB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9DBA733-467C-4505-8199-DD25A5FFBF97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B332FF1C-731D-454C-AA9E-3534040F09E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7965089-8592-47F2-958B-7DBE669BCAC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1750B2D-7AC8-45CF-9879-1D0476EEE86C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CBAA39D-01A0-4B6B-926B-C36C238E5258\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F3707AA-D67A-4966-8DE4-8AEAC3C99B36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECEE4473-88C0-4E28-A5B5-F7383B0E5558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76410AD4-78CA-48EA-83F0-099D0A49626F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9754B270-E01D-415E-9A91-09ECB9B82B28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A01CAF7E-F196-4851-BF1B-CADA51DDBF6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4682E92-E5E7-4351-959E-25A79CA4271B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DF2B21F-7E97-416B-AF5C-35338A254552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBAC41D6-73D4-44E9-87E4-E1E955B9580A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52FCCB1C-165C-49FF-B70B-475B37BDF02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5A5E5-3703-44AC-9963-A20A55002B48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC3E5BEF-3F29-4929-A37C-C49322B19047\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B0E7B5D-2568-4128-8F99-E74D24A7E991\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A04906-7267-4A09-87BF-D639C7CF315B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEA17D3F-A17B-47A6-8066-583F63D11468\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"76C58A91-23BA-4336-A81B-B7FDFAF6CA91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC6E40C4-FA29-4D7A-9018-44154503A68F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98E48C83-01AE-4A33-A004-14B99792674C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B56A2B78-70BD-439B-B1ED-A17FA5EF0990\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"623E4466-82CC-4BDD-BE25-3BB33B585547\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF0002A4-8A90-471C-9813-F648D53E4F3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5ECA190-D7D3-4248-A61E-0D87E67E3D31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FD514B3-AFCD-4CB1-9D1B-18625B771E0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A15E0FA-5570-4C5F-B087-38591D9EBABA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D9F72B1-F398-4E07-8652-2042ADDB8414\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FA2F504-6690-4AAD-97A6-6487E450C92E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19B927D3-D766-4D53-9870-15A7184E4C6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54FE202A-E068-4ECE-B61D-230EFF0E60B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B43E22F-D894-4763-BF55-C9B77911C8EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4218D36C-CCE7-443B-842B-AA1A2C865734\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3311565E-3971-416B-AC9C-6CF9F4EF0F8A\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Opera before 9.52 does not prevent use of links from web pages to feed source files on the local disk, which might allow remote attackers to determine the validity of local filenames via vectors involving \\\"detection of JavaScript events and appropriate manipulation.\\\"\"}, {\"lang\": \"es\", \"value\": \"Opera anterior a v9.52 no previene del uso de enlaces de p\\u00e1ginas web a archivos fuente feed en el disco local, lo cual puede permitir a atacantes remotos determinar la validez de nombres de archivo locales a trav\\u00e9s de vectores involucrando \\\"detecci\\u00f3n de eventos JavaScript y manipulaci\\u00f3n apropiada\\\".\"}]",
      "id": "CVE-2008-4199",
      "lastModified": "2024-11-21T00:51:08.900",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2008-09-27T10:30:03.477",
      "references": "[{\"url\": \"http://bugs.gentoo.org/show_bug.cgi?id=235298\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/31549\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32538\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200811-01.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1020722\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/09/19/2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/09/24/4\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/docs/changelogs/freebsd/952/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/docs/changelogs/linux/952/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/docs/changelogs/mac/952/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/docs/changelogs/solaris/952/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/docs/changelogs/windows/952/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/support/search/view/896/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/30768\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2416\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44557\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://bugs.gentoo.org/show_bug.cgi?id=235298\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31549\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32538\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200811-01.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1020722\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/09/19/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/09/24/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/docs/changelogs/freebsd/952/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/docs/changelogs/linux/952/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/docs/changelogs/mac/952/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/docs/changelogs/solaris/952/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/docs/changelogs/windows/952/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/support/search/view/896/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/30768\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2416\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44557\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-4199\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-09-27T10:30:03.477\",\"lastModified\":\"2024-11-21T00:51:08.900\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Opera before 9.52 does not prevent use of links from web pages to feed source files on the local disk, which might allow remote attackers to determine the validity of local filenames via vectors involving \\\"detection of JavaScript events and appropriate manipulation.\\\"\"},{\"lang\":\"es\",\"value\":\"Opera anterior a v9.52 no previene del uso de enlaces de p\u00e1ginas web a archivos fuente feed en el disco local, lo cual puede permitir a atacantes remotos determinar la validez de nombres de archivo locales a trav\u00e9s de vectores involucrando \\\"detecci\u00f3n de eventos JavaScript y manipulaci\u00f3n apropiada\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.51\",\"matchCriteriaId\":\"C8ECEB59-5441-49AC-857E-10092DB86028\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECFBC71-7814-4A24-A918-C593673727B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"57824075-E3F7-4B23-B4D6-8417C3147085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE078F27-6FC1-466C-8331-A89F8B6FE0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7673C9-C69E-4CD8-9AF4-57AA81B8038A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5839EB88-DF5E-4AB0-899B-DF9F72F5F442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E1865A4-E038-4A1C-877D-5A3CFA9576BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"93966A66-4332-4E76-9B1A-2BBF10AF0ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F51D99-C77D-4DB6-8D4B-DF1CE9078543\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA91E77-301C-48F6-9A57-D5FDCEF743BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49DDEF-681C-4A34-9FF8-17249C42842D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF365891-F3FA-4740-94B2-01F85254A2F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42B4261-C511-4F3A-8596-6BD4E343DC31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2F38FE-7E98-48B2-B0B2-35312368B21F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63687D75-860D-4A36-B6BB-45BD4268B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5120A672-FB60-4DC3-A171-102793C05835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD500741-CF39-4F0C-9F96-6CBDFF8973D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"359941FD-A5CE-43C1-AA76-C1B79BCB08C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9AC78A-CA47-476D-935E-67932BAB98A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E9662C-441F-4AB2-AC4C-30F31C32949A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D681B3-73E6-4257-84B4-DE83F6D659B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF4EF8B-18CA-417C-BA30-024EE25B6AE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E5F2A5-F50F-4085-AB7D-8C91121A429A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E90912E-0CF8-404B-9E86-461497C65A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E19DD71-9447-4946-931F-4866537C8BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54075890-6E0C-4AB7-8BD5-2023419CC251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ABC3435-77CD-4591-8282-7ADA60225CF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91FA8A44-2CAF-4EE4-940F-0D09BD07FD39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7C35850-B79C-4EE4-A6F2-CC5D2304724B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B797C8-3290-4278-9D4B-A15A14FB8D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEC078C-A8F4-471B-A367-59A86B78590D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10F658D-D2E4-4789-8172-F8842C3EEA05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81687D99-7444-4205-A7BE-992CC758675F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75C4301-68E9-4A10-B9C5-711252BF629B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B147C1A-EA6C-40C8-A54A-96840A6FE9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC690371-3326-421E-8BAC-14F48840671B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E20418A7-1FA7-45EF-99B5-12D283EA6CB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE50982-8026-466C-9F51-867425C9986F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B85C5F65-B814-4BF5-AB43-D0CFFE8175A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD889EC7-E5D2-4137-B85C-86D7DB5CED27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"97452A26-7231-43BE-B70E-B8D05365CAB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DBA733-467C-4505-8199-DD25A5FFBF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B332FF1C-731D-454C-AA9E-3534040F09E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7965089-8592-47F2-958B-7DBE669BCAC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1750B2D-7AC8-45CF-9879-1D0476EEE86C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBAA39D-01A0-4B6B-926B-C36C238E5258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F3707AA-D67A-4966-8DE4-8AEAC3C99B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEE4473-88C0-4E28-A5B5-F7383B0E5558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76410AD4-78CA-48EA-83F0-099D0A49626F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9754B270-E01D-415E-9A91-09ECB9B82B28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01CAF7E-F196-4851-BF1B-CADA51DDBF6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4682E92-E5E7-4351-959E-25A79CA4271B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF2B21F-7E97-416B-AF5C-35338A254552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBAC41D6-73D4-44E9-87E4-E1E955B9580A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FCCB1C-165C-49FF-B70B-475B37BDF02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5A5E5-3703-44AC-9963-A20A55002B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC3E5BEF-3F29-4929-A37C-C49322B19047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0E7B5D-2568-4128-8F99-E74D24A7E991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A04906-7267-4A09-87BF-D639C7CF315B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA17D3F-A17B-47A6-8066-583F63D11468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C58A91-23BA-4336-A81B-B7FDFAF6CA91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC6E40C4-FA29-4D7A-9018-44154503A68F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E48C83-01AE-4A33-A004-14B99792674C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B56A2B78-70BD-439B-B1ED-A17FA5EF0990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623E4466-82CC-4BDD-BE25-3BB33B585547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF0002A4-8A90-471C-9813-F648D53E4F3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5ECA190-D7D3-4248-A61E-0D87E67E3D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD514B3-AFCD-4CB1-9D1B-18625B771E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A15E0FA-5570-4C5F-B087-38591D9EBABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D9F72B1-F398-4E07-8652-2042ADDB8414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FA2F504-6690-4AAD-97A6-6487E450C92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19B927D3-D766-4D53-9870-15A7184E4C6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54FE202A-E068-4ECE-B61D-230EFF0E60B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B43E22F-D894-4763-BF55-C9B77911C8EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4218D36C-CCE7-443B-842B-AA1A2C865734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3311565E-3971-416B-AC9C-6CF9F4EF0F8A\"}]}]}],\"references\":[{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=235298\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31549\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32538\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200811-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1020722\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/09/19/2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/09/24/4\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/freebsd/952/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/952/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/mac/952/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/solaris/952/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/windows/952/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/support/search/view/896/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/30768\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2416\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44557\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=235298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32538\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200811-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1020722\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/09/19/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/09/24/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/freebsd/952/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/952/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/mac/952/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/solaris/952/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/windows/952/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/support/search/view/896/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/30768\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2416\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44557\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.