CVE-2008-5679 (GCVE-0-2008-5679)

Vulnerability from cvelistv5 – Published: 2008-12-19 16:09 – Updated: 2024-08-07 11:04
VLAI?
Summary
The HTML parsing engine in Opera before 9.63 allows remote attackers to execute arbitrary code via crafted web pages that trigger an invalid pointer calculation and heap corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/499315/100… mailing-listx_refsource_BUGTRAQ
http://www.opera.com/docs/changelogs/linux/963/ x_refsource_CONFIRM
http://securityreason.com/securityalert/4791 third-party-advisoryx_refsource_SREASON
http://www.securitytracker.com/id?1021460 vdb-entryx_refsource_SECTRACK
http://www.opera.com/support/kb/view/921/ x_refsource_CONFIRM
http://secunia.com/advisories/34294 third-party-advisoryx_refsource_SECUNIA
http://www.nruns.com/security_advisory_opera_html… x_refsource_MISC
http://security.gentoo.org/glsa/glsa-200903-30.xml vendor-advisoryx_refsource_GENTOO
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.051Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20081217 n.runs-SA-2008.010 - Opera HTML parsing Code Execution",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/499315/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/linux/963/"
          },
          {
            "name": "4791",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4791"
          },
          {
            "name": "1021460",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021460"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/support/kb/view/921/"
          },
          {
            "name": "34294",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34294"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nruns.com/security_advisory_opera_html_parsing_code_execution.php"
          },
          {
            "name": "GLSA-200903-30",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200903-30.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The HTML parsing engine in Opera before 9.63 allows remote attackers to execute arbitrary code via crafted web pages that trigger an invalid pointer calculation and heap corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20081217 n.runs-SA-2008.010 - Opera HTML parsing Code Execution",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/499315/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/linux/963/"
        },
        {
          "name": "4791",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4791"
        },
        {
          "name": "1021460",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021460"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/support/kb/view/921/"
        },
        {
          "name": "34294",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34294"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nruns.com/security_advisory_opera_html_parsing_code_execution.php"
        },
        {
          "name": "GLSA-200903-30",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200903-30.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5679",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The HTML parsing engine in Opera before 9.63 allows remote attackers to execute arbitrary code via crafted web pages that trigger an invalid pointer calculation and heap corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20081217 n.runs-SA-2008.010 - Opera HTML parsing Code Execution",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/499315/100/0/threaded"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/linux/963/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/linux/963/"
            },
            {
              "name": "4791",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4791"
            },
            {
              "name": "1021460",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021460"
            },
            {
              "name": "http://www.opera.com/support/kb/view/921/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/support/kb/view/921/"
            },
            {
              "name": "34294",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34294"
            },
            {
              "name": "http://www.nruns.com/security_advisory_opera_html_parsing_code_execution.php",
              "refsource": "MISC",
              "url": "http://www.nruns.com/security_advisory_opera_html_parsing_code_execution.php"
            },
            {
              "name": "GLSA-200903-30",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200903-30.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5679",
    "datePublished": "2008-12-19T16:09:00",
    "dateReserved": "2008-12-19T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.051Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E55AA4C5-7075-4336-AFC0-F8981054F8D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.62\", \"matchCriteriaId\": \"470B01C5-EB35-4105-86EA-81D7FD51D1C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5..10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40073FD8-6E5A-4770-837A-CAF0C8FD2A2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F071C3F7-A3C4-475D-8843-B52F2DB7C56D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.0:beta_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CBC39B3-4106-4B28-8AFB-4F4B5B5119D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.0:beta_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"763CEF7F-AAB2-4C16-BDC2-E5F864111592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.0:beta_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"B66F0EC7-452C-4847-B028-5086FE657440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.0:beta_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F966486-485B-4B0D-9BE1-F1D39CB08863\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.0:beta_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"A32E4272-6CEF-4C1C-BDA2-96863E8301DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.0:beta_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"47B21D05-A906-44B5-AEDA-73D383B905E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.0:beta_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0BA115B-C42E-4794-90BC-778B0C85CE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00ED2069-849A-4E62-88B3-323A8682F573\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C0F2643-923D-4072-B5A4-6321066C3AAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5830888-AE31-4C80-A923-EA83B4464859\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D45E22AA-46A6-42F3-9E5B-95958163EF6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"655604B2-773D-4F94-951B-6E17E123EFA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E856FB7-7315-4ABF-A835-0BEF9BA10DC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE22CFC5-1607-4FF1-8681-24AE2C167C26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCF854C3-7C1A-4B0D-B27D-10B52B9C41E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C27A748-0792-499F-A3A1-3C9528A5AD0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E606F772-09E2-40F1-84C1-1A5B2BBD2FFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4500A623-BD2C-461A-B862-2C51BD25BE71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5E77793-94BC-47D8-B2D1-D3B020DEF93C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0EC8D15-02D5-4988-85FD-50B1ABCC7B4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC32B83A-4E91-4D1D-8051-35F339E61A78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BF315DF-C0C9-468C-8C7E-C4547AF431FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.0:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"63114EE0-54F7-4418-9B9E-C37BB2869F88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.0:beta_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF5C9CB9-6396-415D-AC64-312F47A76177\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.0:beta_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8F3056A-14B5-411F-8FE8-80AF5605001D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CF6B223-8575-40C7-9EDA-BDDCF6ABDBAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5159296-AD9C-4199-B5DF-539EE61D45A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE952E7C-EBDC-4652-95C3-C308BBEF1FAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE616514-882C-4ED2-BB0C-1248B8316ED2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00A6FD59-C258-4A49-81C9-F6E58FB30117\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DADA8A93-4DF4-4C95-860E-65CA46B12DD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9EF0387-AEFC-40BC-A7C8-28F175844CC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB1B176A-1200-4E75-BFC0-AA5F87E2AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"911B0336-02CE-426C-ABFF-8CFD3BC146CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"26FC4ABB-EDA9-426D-ADC9-E7DABEB8A64E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7:beta_1.2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB0E448B-8A9C-44BF-AE29-D05900F6FEF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5435A52-0F9D-41AC-9FF9-93A512D0103C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.0:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"790C5B0D-9A06-4C0C-BBBF-9B4C17857213\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.0:beta_1v2:*:*:*:*:*:*\", \"matchCriteriaId\": \"620666CE-AABB-4A36-9566-425F2C810F55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.0:beta_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD72F9AF-EFD5-408B-9FC3-6341F92B39B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2590789F-F333-4AD0-82B4-D6D9B9E0F5AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"355242B3-33ED-4B65-8373-3CDC6C556B4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A685E97D-3B0F-4C69-8124-F3AB26905124\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4FDEC39-7B53-4AD9-9EDF-D95860264345\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE7F056E-BB13-4453-8065-C18E6171AC0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0221A7DE-9F8F-46A4-B609-1F10D2606370\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.20:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3089B27-E279-46B8-91C3-2040DBEBC281\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7433778F-DE4F-48A7-8AF7-8DBD17DC4C5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02178B82-3805-4B7C-B341-4F4E280B4DFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FA8888D-6CC5-4ED8-9907-0B9709F2980A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A860F7C-F2FF-40A9-88DA-35766836A8F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.50:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"47871B2C-F6DA-4C92-BA15-90BA8FE3F979\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7E2EA7B-19D5-4A6A-88BE-BEEEAA792536\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E50D780-F507-49BC-8C34-477C6A7C3741\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"476868D1-E4EA-4F9A-8282-0CE5BB574362\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BA7025B-BBB5-43BC-AB6E-E41E56430AB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.54:update_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E33873C-DFD6-4450-8A9A-31CF2437E5FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:7.54:update_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4D545A5-A8D9-4678-BB58-248B999AF4F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00336594-FE61-4815-B52F-90BE545E9428\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.0:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"262ADE2E-4E91-4BA3-AAAD-A1B3A18EAAD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.0:beta_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"587EBDA2-C0F1-469B-A9A9-68634CF058A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.0:beta_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EBC3851-2A2E-41E9-A6D0-D41334BF7C84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CCE749D-8553-4365-A8C5-A6C9037FEAFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38F2F078-9620-4ED1-BA42-44C167DEF2A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0B61DF6-755B-44D1-88C2-F3EF33BD6183\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A006AB3D-3228-4980-A45C-F331E8236867\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"625DF977-9C3A-4904-BF77-DE1CE7C9AA53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5C0B1FD-140F-43BF-963F-55C6929DE68B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:8.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"244D2B12-5C3A-4007-B93C-0194417C00A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEDD65A0-57AA-4374-AF0D-EBE7B6F4A3CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.0:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1C64664-5B10-48E4-A457-56DBC8EB30D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.0:beta_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EC34889-5A1F-4763-995E-67EE06EFB817\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85AD3AC7-F403-4A80-B56B-D32DF61A708A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DADC950D-2542-43B3-BC71-FFE3AD76E29B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BC3478B-E45C-415C-B3D8-D9937BB3D98C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62EFDBC5-7ADB-4F66-8F0A-B234FC9C9B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B57ECE1A-72DE-4E9C-B762-2935A964277F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.20:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"83D2E44B-7DD4-4C41-BCCB-4B6F1D7DE171\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8C204EE-8435-4CCA-B08C-60E702441AF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64166ABD-39BA-482C-BCA5-44468105E8BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B766176F-E80A-433A-AC30-1A1265FCDE53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CC06019-8CF0-4F01-8A63-853FB3F60185\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6E09E20-40D5-4166-B870-5954339E176D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E751386F-0179-4BE7-9F46-66455EAFB1A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A7D9843-8967-4E36-9609-4497EECB2842\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F85686-88F9-412C-9105-F94D4D4D61FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.50:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1646DDF9-C217-4EF6-83D0-8F0CB2A16E0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.50:beta_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"29DDD7BF-9265-4202-93C1-98FAEC336190\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"089A088C-6DAE-4335-AD14-DACE64641A5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB8DBBA4-B5A1-41FC-9E09-7D2397383C49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C77201A9-5FAA-47F6-8C1A-6B55C5A2B3ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.60:beta_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5F81D1F-EB31-4B3C-BD2F-27242BC976EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera:9.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FD18939-757A-4ED5-81EB-5D83FD305A0C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The HTML parsing engine in Opera before 9.63 allows remote attackers to execute arbitrary code via crafted web pages that trigger an invalid pointer calculation and heap corruption.\"}, {\"lang\": \"es\", \"value\": \"El motor de an\\u00e1lisis HTML en versiones de Opera anteriores a la 9.63 permite a atacantes remotos ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de p\\u00e1ginas web convenientemente modificadas ocasionando un calculo de puntero inv\\u00e1lido y la corrupci\\u00f3n del mont\\u00edculo (heap).\"}]",
      "id": "CVE-2008-5679",
      "lastModified": "2024-11-21T00:54:37.613",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2008-12-19T16:30:00.203",
      "references": "[{\"url\": \"http://secunia.com/advisories/34294\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200903-30.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securityreason.com/securityalert/4791\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.nruns.com/security_advisory_opera_html_parsing_code_execution.php\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/docs/changelogs/linux/963/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/support/kb/view/921/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/499315/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021460\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/34294\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200903-30.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/4791\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.nruns.com/security_advisory_opera_html_parsing_code_execution.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/docs/changelogs/linux/963/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/support/kb/view/921/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/499315/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021460\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-5679\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-12-19T16:30:00.203\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The HTML parsing engine in Opera before 9.63 allows remote attackers to execute arbitrary code via crafted web pages that trigger an invalid pointer calculation and heap corruption.\"},{\"lang\":\"es\",\"value\":\"El motor de an\u00e1lisis HTML en versiones de Opera anteriores a la 9.63 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de p\u00e1ginas web convenientemente modificadas ocasionando un calculo de puntero inv\u00e1lido y la corrupci\u00f3n del mont\u00edculo (heap).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E55AA4C5-7075-4336-AFC0-F8981054F8D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.62\",\"matchCriteriaId\":\"470B01C5-EB35-4105-86EA-81D7FD51D1C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5..10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40073FD8-6E5A-4770-837A-CAF0C8FD2A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F071C3F7-A3C4-475D-8843-B52F2DB7C56D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CBC39B3-4106-4B28-8AFB-4F4B5B5119D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"763CEF7F-AAB2-4C16-BDC2-E5F864111592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B66F0EC7-452C-4847-B028-5086FE657440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F966486-485B-4B0D-9BE1-F1D39CB08863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32E4272-6CEF-4C1C-BDA2-96863E8301DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B21D05-A906-44B5-AEDA-73D383B905E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.0:beta_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0BA115B-C42E-4794-90BC-778B0C85CE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00ED2069-849A-4E62-88B3-323A8682F573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C0F2643-923D-4072-B5A4-6321066C3AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5830888-AE31-4C80-A923-EA83B4464859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45E22AA-46A6-42F3-9E5B-95958163EF6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"655604B2-773D-4F94-951B-6E17E123EFA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E856FB7-7315-4ABF-A835-0BEF9BA10DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE22CFC5-1607-4FF1-8681-24AE2C167C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCF854C3-7C1A-4B0D-B27D-10B52B9C41E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C27A748-0792-499F-A3A1-3C9528A5AD0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E606F772-09E2-40F1-84C1-1A5B2BBD2FFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4500A623-BD2C-461A-B862-2C51BD25BE71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E77793-94BC-47D8-B2D1-D3B020DEF93C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0EC8D15-02D5-4988-85FD-50B1ABCC7B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC32B83A-4E91-4D1D-8051-35F339E61A78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF315DF-C0C9-468C-8C7E-C4547AF431FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"63114EE0-54F7-4418-9B9E-C37BB2869F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF5C9CB9-6396-415D-AC64-312F47A76177\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.0:beta_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8F3056A-14B5-411F-8FE8-80AF5605001D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF6B223-8575-40C7-9EDA-BDDCF6ABDBAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5159296-AD9C-4199-B5DF-539EE61D45A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE952E7C-EBDC-4652-95C3-C308BBEF1FAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE616514-882C-4ED2-BB0C-1248B8316ED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00A6FD59-C258-4A49-81C9-F6E58FB30117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADA8A93-4DF4-4C95-860E-65CA46B12DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9EF0387-AEFC-40BC-A7C8-28F175844CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1B176A-1200-4E75-BFC0-AA5F87E2AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"911B0336-02CE-426C-ABFF-8CFD3BC146CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FC4ABB-EDA9-426D-ADC9-E7DABEB8A64E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7:beta_1.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB0E448B-8A9C-44BF-AE29-D05900F6FEF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5435A52-0F9D-41AC-9FF9-93A512D0103C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"790C5B0D-9A06-4C0C-BBBF-9B4C17857213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:beta_1v2:*:*:*:*:*:*\",\"matchCriteriaId\":\"620666CE-AABB-4A36-9566-425F2C810F55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD72F9AF-EFD5-408B-9FC3-6341F92B39B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2590789F-F333-4AD0-82B4-D6D9B9E0F5AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"355242B3-33ED-4B65-8373-3CDC6C556B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A685E97D-3B0F-4C69-8124-F3AB26905124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FDEC39-7B53-4AD9-9EDF-D95860264345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7F056E-BB13-4453-8065-C18E6171AC0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0221A7DE-9F8F-46A4-B609-1F10D2606370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.20:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3089B27-E279-46B8-91C3-2040DBEBC281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7433778F-DE4F-48A7-8AF7-8DBD17DC4C5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02178B82-3805-4B7C-B341-4F4E280B4DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FA8888D-6CC5-4ED8-9907-0B9709F2980A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A860F7C-F2FF-40A9-88DA-35766836A8F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.50:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"47871B2C-F6DA-4C92-BA15-90BA8FE3F979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E2EA7B-19D5-4A6A-88BE-BEEEAA792536\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E50D780-F507-49BC-8C34-477C6A7C3741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476868D1-E4EA-4F9A-8282-0CE5BB574362\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA7025B-BBB5-43BC-AB6E-E41E56430AB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.54:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E33873C-DFD6-4450-8A9A-31CF2437E5FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:7.54:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D545A5-A8D9-4678-BB58-248B999AF4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00336594-FE61-4815-B52F-90BE545E9428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"262ADE2E-4E91-4BA3-AAAD-A1B3A18EAAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"587EBDA2-C0F1-469B-A9A9-68634CF058A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.0:beta_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EBC3851-2A2E-41E9-A6D0-D41334BF7C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCE749D-8553-4365-A8C5-A6C9037FEAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F2F078-9620-4ED1-BA42-44C167DEF2A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0B61DF6-755B-44D1-88C2-F3EF33BD6183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A006AB3D-3228-4980-A45C-F331E8236867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"625DF977-9C3A-4904-BF77-DE1CE7C9AA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5C0B1FD-140F-43BF-963F-55C6929DE68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:8.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"244D2B12-5C3A-4007-B93C-0194417C00A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEDD65A0-57AA-4374-AF0D-EBE7B6F4A3CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.0:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C64664-5B10-48E4-A457-56DBC8EB30D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.0:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC34889-5A1F-4763-995E-67EE06EFB817\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85AD3AC7-F403-4A80-B56B-D32DF61A708A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADC950D-2542-43B3-BC71-FFE3AD76E29B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC3478B-E45C-415C-B3D8-D9937BB3D98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62EFDBC5-7ADB-4F66-8F0A-B234FC9C9B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B57ECE1A-72DE-4E9C-B762-2935A964277F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.20:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D2E44B-7DD4-4C41-BCCB-4B6F1D7DE171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C204EE-8435-4CCA-B08C-60E702441AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64166ABD-39BA-482C-BCA5-44468105E8BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B766176F-E80A-433A-AC30-1A1265FCDE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC06019-8CF0-4F01-8A63-853FB3F60185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E09E20-40D5-4166-B870-5954339E176D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E751386F-0179-4BE7-9F46-66455EAFB1A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7D9843-8967-4E36-9609-4497EECB2842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F85686-88F9-412C-9105-F94D4D4D61FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.50:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1646DDF9-C217-4EF6-83D0-8F0CB2A16E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.50:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DDD7BF-9265-4202-93C1-98FAEC336190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"089A088C-6DAE-4335-AD14-DACE64641A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB8DBBA4-B5A1-41FC-9E09-7D2397383C49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C77201A9-5FAA-47F6-8C1A-6B55C5A2B3ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.60:beta_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5F81D1F-EB31-4B3C-BD2F-27242BC976EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera:9.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD18939-757A-4ED5-81EB-5D83FD305A0C\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/34294\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200903-30.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/4791\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.nruns.com/security_advisory_opera_html_parsing_code_execution.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/963/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/support/kb/view/921/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/499315/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021460\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34294\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200903-30.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/4791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.nruns.com/security_advisory_opera_html_parsing_code_execution.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/963/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/support/kb/view/921/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/499315/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…