cve-2008-5680
Vulnerability from cvelistv5
Published
2008-12-19 16:09
Modified
2024-08-07 11:04
Severity ?
Summary
Multiple buffer overflows in Opera before 9.63 might allow (1) remote attackers to execute arbitrary code via a crafted text area, or allow (2) user-assisted remote attackers to execute arbitrary code via a long host name in a file: URL. NOTE: this might overlap CVE-2008-5178.
References
cve@mitre.orghttp://secunia.com/advisories/34294
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200903-30.xml
cve@mitre.orghttp://securitytracker.com/id?1021457
cve@mitre.orghttp://www.opera.com/docs/changelogs/linux/963/
cve@mitre.orghttp://www.opera.com/support/kb/view/920/Vendor Advisory
cve@mitre.orghttp://www.opera.com/support/kb/view/922/Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/498452/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/498481/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/498499/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/498517/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/498543/100/0/threaded
cve@mitre.orghttp://www.securitytracker.com/id?1021456
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34294
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200903-30.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021457
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/docs/changelogs/linux/963/
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/support/kb/view/920/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.opera.com/support/kb/view/922/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/498452/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/498481/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/498499/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/498517/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/498543/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021456
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.218Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/support/kb/view/920/"
          },
          {
            "name": "20081119 Re: Re: Re: Re: Re: Opera 9.6x file:// overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/498517/100/0/threaded"
          },
          {
            "name": "1021456",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021456"
          },
          {
            "name": "20081119 Re: Opera 9.6x file:// overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/498481/100/0/threaded"
          },
          {
            "name": "20081118 Re: Re: Re: Opera 9.6x file:// overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/498452/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/docs/changelogs/linux/963/"
          },
          {
            "name": "20081119 Re: Re: Re: Re: Opera 9.6x file:// overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/498499/100/0/threaded"
          },
          {
            "name": "1021457",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021457"
          },
          {
            "name": "34294",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34294"
          },
          {
            "name": "20081120 Re: Re: Re: Re: Re: Re: Opera 9.6x file:// overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/498543/100/0/threaded"
          },
          {
            "name": "GLSA-200903-30",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200903-30.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.opera.com/support/kb/view/922/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in Opera before 9.63 might allow (1) remote attackers to execute arbitrary code via a crafted text area, or allow (2) user-assisted remote attackers to execute arbitrary code via a long host name in a file: URL.  NOTE: this might overlap CVE-2008-5178."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/support/kb/view/920/"
        },
        {
          "name": "20081119 Re: Re: Re: Re: Re: Opera 9.6x file:// overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/498517/100/0/threaded"
        },
        {
          "name": "1021456",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021456"
        },
        {
          "name": "20081119 Re: Opera 9.6x file:// overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/498481/100/0/threaded"
        },
        {
          "name": "20081118 Re: Re: Re: Opera 9.6x file:// overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/498452/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/docs/changelogs/linux/963/"
        },
        {
          "name": "20081119 Re: Re: Re: Re: Opera 9.6x file:// overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/498499/100/0/threaded"
        },
        {
          "name": "1021457",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021457"
        },
        {
          "name": "34294",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34294"
        },
        {
          "name": "20081120 Re: Re: Re: Re: Re: Re: Opera 9.6x file:// overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/498543/100/0/threaded"
        },
        {
          "name": "GLSA-200903-30",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200903-30.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.opera.com/support/kb/view/922/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5680",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in Opera before 9.63 might allow (1) remote attackers to execute arbitrary code via a crafted text area, or allow (2) user-assisted remote attackers to execute arbitrary code via a long host name in a file: URL.  NOTE: this might overlap CVE-2008-5178."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.opera.com/support/kb/view/920/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/support/kb/view/920/"
            },
            {
              "name": "20081119 Re: Re: Re: Re: Re: Opera 9.6x file:// overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/498517/100/0/threaded"
            },
            {
              "name": "1021456",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021456"
            },
            {
              "name": "20081119 Re: Opera 9.6x file:// overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/498481/100/0/threaded"
            },
            {
              "name": "20081118 Re: Re: Re: Opera 9.6x file:// overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/498452/100/0/threaded"
            },
            {
              "name": "http://www.opera.com/docs/changelogs/linux/963/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/docs/changelogs/linux/963/"
            },
            {
              "name": "20081119 Re: Re: Re: Re: Opera 9.6x file:// overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/498499/100/0/threaded"
            },
            {
              "name": "1021457",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021457"
            },
            {
              "name": "34294",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34294"
            },
            {
              "name": "20081120 Re: Re: Re: Re: Re: Re: Opera 9.6x file:// overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/498543/100/0/threaded"
            },
            {
              "name": "GLSA-200903-30",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200903-30.xml"
            },
            {
              "name": "http://www.opera.com/support/kb/view/922/",
              "refsource": "CONFIRM",
              "url": "http://www.opera.com/support/kb/view/922/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5680",
    "datePublished": "2008-12-19T16:09:00",
    "dateReserved": "2008-12-19T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.218Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.62\", \"matchCriteriaId\": \"D239D60E-36F5-4301-AAC7-6F6D928093B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F892EEF-54EC-4EC0-84B3-BD5C216AED80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"089BEFE3-24B2-4C73-BA25-7C905ED68A50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B73E6B0-2113-4D09-A665-7D8FEC3A3D59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"76AECDD0-C14D-4A68-AF2E-1C41A51089EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C06EBBF-8B64-4C22-9EDA-E133AFD205DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D888C22C-41F9-427D-9249-F010891DA48E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"326AE3EE-3BF3-4B7E-B3FC-445FB9D6E4C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94FAD06C-830A-4CB6-B9AF-7E093B64B69B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9BDFBD0-3CAC-4617-B1B2-7F95E7C648D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5366D587-7E77-4288-AB31-48108D04E0B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60EFFC44-A329-4FA5-B57C-FA8892F8226B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9241CFD0-9E61-487F-B076-2D7B8ACEA381\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACEE8213-BD3A-405B-BC4C-8B80EBDF5A42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A9A60F2-516D-4ECA-9ABC-4887EC4176E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB49750B-DAA1-4417-8384-1F4D47F2227D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1099D38B-82EC-43C9-9DF5-D5EDC19834DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6D64030-1877-4F29-8340-93DB6E0F1F13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5AC1241-B922-4BE7-93C1-077FC0DA1CA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D65D0F7A-9414-4CF5-8460-DFDB55F61E5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"85184E8A-C42D-4CBD-ACB4-B58752C305D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"D422BB16-9F9C-4554-B2F1-826EB5BCB1ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA682571-536B-4CD9-A820-47E897B01480\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*\", \"matchCriteriaId\": \"298457B8-051B-46D0-81B4-C5B63B69EB98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7D4BC07-C37E-4F99-8DEA-54A45250050A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E2B80FF-7ACB-43F5-9BD5-BF18A0EB4DD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CECFBC71-7814-4A24-A918-C593673727B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"57824075-E3F7-4B23-B4D6-8417C3147085\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE078F27-6FC1-466C-8331-A89F8B6FE0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B7673C9-C69E-4CD8-9AF4-57AA81B8038A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*\", \"matchCriteriaId\": \"5839EB88-DF5E-4AB0-899B-DF9F72F5F442\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E1865A4-E038-4A1C-877D-5A3CFA9576BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*\", \"matchCriteriaId\": \"93966A66-4332-4E76-9B1A-2BBF10AF0ACC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4F51D99-C77D-4DB6-8D4B-DF1CE9078543\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAA91E77-301C-48F6-9A57-D5FDCEF743BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C49DDEF-681C-4A34-9FF8-17249C42842D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF365891-F3FA-4740-94B2-01F85254A2F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E42B4261-C511-4F3A-8596-6BD4E343DC31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D2F38FE-7E98-48B2-B0B2-35312368B21F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"63687D75-860D-4A36-B6BB-45BD4268B6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD500741-CF39-4F0C-9F96-6CBDFF8973D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"359941FD-A5CE-43C1-AA76-C1B79BCB08C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9AC78A-CA47-476D-935E-67932BAB98A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E9662C-441F-4AB2-AC4C-30F31C32949A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8D681B3-73E6-4257-84B4-DE83F6D659B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BF4EF8B-18CA-417C-BA30-024EE25B6AE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9E5F2A5-F50F-4085-AB7D-8C91121A429A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E90912E-0CF8-404B-9E86-461497C65A5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E19DD71-9447-4946-931F-4866537C8BC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54075890-6E0C-4AB7-8BD5-2023419CC251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ABC3435-77CD-4591-8282-7ADA60225CF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91FA8A44-2CAF-4EE4-940F-0D09BD07FD39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7C35850-B79C-4EE4-A6F2-CC5D2304724B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B797C8-3290-4278-9D4B-A15A14FB8D3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFEC078C-A8F4-471B-A367-59A86B78590D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E10F658D-D2E4-4789-8172-F8842C3EEA05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81687D99-7444-4205-A7BE-992CC758675F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D75C4301-68E9-4A10-B9C5-711252BF629B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B147C1A-EA6C-40C8-A54A-96840A6FE9DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC690371-3326-421E-8BAC-14F48840671B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E20418A7-1FA7-45EF-99B5-12D283EA6CB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BE50982-8026-466C-9F51-867425C9986F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B85C5F65-B814-4BF5-AB43-D0CFFE8175A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD889EC7-E5D2-4137-B85C-86D7DB5CED27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"97452A26-7231-43BE-B70E-B8D05365CAB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9DBA733-467C-4505-8199-DD25A5FFBF97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B332FF1C-731D-454C-AA9E-3534040F09E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7965089-8592-47F2-958B-7DBE669BCAC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1750B2D-7AC8-45CF-9879-1D0476EEE86C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CBAA39D-01A0-4B6B-926B-C36C238E5258\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F3707AA-D67A-4966-8DE4-8AEAC3C99B36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECEE4473-88C0-4E28-A5B5-F7383B0E5558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76410AD4-78CA-48EA-83F0-099D0A49626F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9754B270-E01D-415E-9A91-09ECB9B82B28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A01CAF7E-F196-4851-BF1B-CADA51DDBF6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4682E92-E5E7-4351-959E-25A79CA4271B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DF2B21F-7E97-416B-AF5C-35338A254552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBAC41D6-73D4-44E9-87E4-E1E955B9580A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52FCCB1C-165C-49FF-B70B-475B37BDF02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5A5E5-3703-44AC-9963-A20A55002B48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC3E5BEF-3F29-4929-A37C-C49322B19047\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B0E7B5D-2568-4128-8F99-E74D24A7E991\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A04906-7267-4A09-87BF-D639C7CF315B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEA17D3F-A17B-47A6-8066-583F63D11468\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"76C58A91-23BA-4336-A81B-B7FDFAF6CA91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC6E40C4-FA29-4D7A-9018-44154503A68F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98E48C83-01AE-4A33-A004-14B99792674C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B56A2B78-70BD-439B-B1ED-A17FA5EF0990\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"623E4466-82CC-4BDD-BE25-3BB33B585547\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF0002A4-8A90-471C-9813-F648D53E4F3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5ECA190-D7D3-4248-A61E-0D87E67E3D31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FD514B3-AFCD-4CB1-9D1B-18625B771E0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A15E0FA-5570-4C5F-B087-38591D9EBABA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D9F72B1-F398-4E07-8652-2042ADDB8414\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FA2F504-6690-4AAD-97A6-6487E450C92E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19B927D3-D766-4D53-9870-15A7184E4C6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54FE202A-E068-4ECE-B61D-230EFF0E60B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B43E22F-D894-4763-BF55-C9B77911C8EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4218D36C-CCE7-443B-842B-AA1A2C865734\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3311565E-3971-416B-AC9C-6CF9F4EF0F8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAC4250E-E638-4015-B5EF-7B5405F7FBFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1B7AA6F-9918-4356-894C-72833B791201\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFA48444-F998-425B-896A-CE9276869BA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D9BFC45-39DF-47A6-B013-4299D2A0FB01\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple buffer overflows in Opera before 9.63 might allow (1) remote attackers to execute arbitrary code via a crafted text area, or allow (2) user-assisted remote attackers to execute arbitrary code via a long host name in a file: URL.  NOTE: this might overlap CVE-2008-5178.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples desbordamientos de b\\u00fafer en versiones de Opera anteriores a la 9.63 podr\\u00edan permitir (1) a atacantes remotos ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de un textarea convenientemente modificada, o permitir (2) con ayuda de los usuarios a atacantes remotos ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de un nombre de host demasiado largo en un archivo.\"}]",
      "id": "CVE-2008-5680",
      "lastModified": "2024-11-21T00:54:37.770",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2008-12-19T16:30:00.217",
      "references": "[{\"url\": \"http://secunia.com/advisories/34294\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200903-30.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1021457\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/docs/changelogs/linux/963/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/support/kb/view/920/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.opera.com/support/kb/view/922/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/498452/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498481/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498499/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498517/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498543/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021456\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/34294\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200903-30.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1021457\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/docs/changelogs/linux/963/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/support/kb/view/920/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.opera.com/support/kb/view/922/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/498452/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498481/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498499/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498517/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498543/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021456\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-5680\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-12-19T16:30:00.217\",\"lastModified\":\"2024-11-21T00:54:37.770\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in Opera before 9.63 might allow (1) remote attackers to execute arbitrary code via a crafted text area, or allow (2) user-assisted remote attackers to execute arbitrary code via a long host name in a file: URL.  NOTE: this might overlap CVE-2008-5178.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer en versiones de Opera anteriores a la 9.63 podr\u00edan permitir (1) a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un textarea convenientemente modificada, o permitir (2) con ayuda de los usuarios a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un nombre de host demasiado largo en un archivo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.62\",\"matchCriteriaId\":\"D239D60E-36F5-4301-AAC7-6F6D928093B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F892EEF-54EC-4EC0-84B3-BD5C216AED80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"089BEFE3-24B2-4C73-BA25-7C905ED68A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B73E6B0-2113-4D09-A665-7D8FEC3A3D59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"76AECDD0-C14D-4A68-AF2E-1C41A51089EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C06EBBF-8B64-4C22-9EDA-E133AFD205DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D888C22C-41F9-427D-9249-F010891DA48E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326AE3EE-3BF3-4B7E-B3FC-445FB9D6E4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94FAD06C-830A-4CB6-B9AF-7E093B64B69B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BDFBD0-3CAC-4617-B1B2-7F95E7C648D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5366D587-7E77-4288-AB31-48108D04E0B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60EFFC44-A329-4FA5-B57C-FA8892F8226B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9241CFD0-9E61-487F-B076-2D7B8ACEA381\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEE8213-BD3A-405B-BC4C-8B80EBDF5A42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A9A60F2-516D-4ECA-9ABC-4887EC4176E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB49750B-DAA1-4417-8384-1F4D47F2227D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1099D38B-82EC-43C9-9DF5-D5EDC19834DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D64030-1877-4F29-8340-93DB6E0F1F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AC1241-B922-4BE7-93C1-077FC0DA1CA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D65D0F7A-9414-4CF5-8460-DFDB55F61E5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"85184E8A-C42D-4CBD-ACB4-B58752C305D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D422BB16-9F9C-4554-B2F1-826EB5BCB1ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA682571-536B-4CD9-A820-47E897B01480\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"298457B8-051B-46D0-81B4-C5B63B69EB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D4BC07-C37E-4F99-8DEA-54A45250050A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B80FF-7ACB-43F5-9BD5-BF18A0EB4DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECFBC71-7814-4A24-A918-C593673727B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"57824075-E3F7-4B23-B4D6-8417C3147085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE078F27-6FC1-466C-8331-A89F8B6FE0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7673C9-C69E-4CD8-9AF4-57AA81B8038A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5839EB88-DF5E-4AB0-899B-DF9F72F5F442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E1865A4-E038-4A1C-877D-5A3CFA9576BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"93966A66-4332-4E76-9B1A-2BBF10AF0ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F51D99-C77D-4DB6-8D4B-DF1CE9078543\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA91E77-301C-48F6-9A57-D5FDCEF743BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49DDEF-681C-4A34-9FF8-17249C42842D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF365891-F3FA-4740-94B2-01F85254A2F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42B4261-C511-4F3A-8596-6BD4E343DC31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2F38FE-7E98-48B2-B0B2-35312368B21F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63687D75-860D-4A36-B6BB-45BD4268B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD500741-CF39-4F0C-9F96-6CBDFF8973D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"359941FD-A5CE-43C1-AA76-C1B79BCB08C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9AC78A-CA47-476D-935E-67932BAB98A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E9662C-441F-4AB2-AC4C-30F31C32949A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D681B3-73E6-4257-84B4-DE83F6D659B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF4EF8B-18CA-417C-BA30-024EE25B6AE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E5F2A5-F50F-4085-AB7D-8C91121A429A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E90912E-0CF8-404B-9E86-461497C65A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E19DD71-9447-4946-931F-4866537C8BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54075890-6E0C-4AB7-8BD5-2023419CC251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ABC3435-77CD-4591-8282-7ADA60225CF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91FA8A44-2CAF-4EE4-940F-0D09BD07FD39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7C35850-B79C-4EE4-A6F2-CC5D2304724B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B797C8-3290-4278-9D4B-A15A14FB8D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEC078C-A8F4-471B-A367-59A86B78590D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10F658D-D2E4-4789-8172-F8842C3EEA05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81687D99-7444-4205-A7BE-992CC758675F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75C4301-68E9-4A10-B9C5-711252BF629B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B147C1A-EA6C-40C8-A54A-96840A6FE9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC690371-3326-421E-8BAC-14F48840671B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E20418A7-1FA7-45EF-99B5-12D283EA6CB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE50982-8026-466C-9F51-867425C9986F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B85C5F65-B814-4BF5-AB43-D0CFFE8175A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD889EC7-E5D2-4137-B85C-86D7DB5CED27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"97452A26-7231-43BE-B70E-B8D05365CAB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DBA733-467C-4505-8199-DD25A5FFBF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B332FF1C-731D-454C-AA9E-3534040F09E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7965089-8592-47F2-958B-7DBE669BCAC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1750B2D-7AC8-45CF-9879-1D0476EEE86C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBAA39D-01A0-4B6B-926B-C36C238E5258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F3707AA-D67A-4966-8DE4-8AEAC3C99B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEE4473-88C0-4E28-A5B5-F7383B0E5558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76410AD4-78CA-48EA-83F0-099D0A49626F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9754B270-E01D-415E-9A91-09ECB9B82B28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01CAF7E-F196-4851-BF1B-CADA51DDBF6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4682E92-E5E7-4351-959E-25A79CA4271B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF2B21F-7E97-416B-AF5C-35338A254552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBAC41D6-73D4-44E9-87E4-E1E955B9580A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FCCB1C-165C-49FF-B70B-475B37BDF02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5A5E5-3703-44AC-9963-A20A55002B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC3E5BEF-3F29-4929-A37C-C49322B19047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0E7B5D-2568-4128-8F99-E74D24A7E991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A04906-7267-4A09-87BF-D639C7CF315B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA17D3F-A17B-47A6-8066-583F63D11468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C58A91-23BA-4336-A81B-B7FDFAF6CA91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC6E40C4-FA29-4D7A-9018-44154503A68F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E48C83-01AE-4A33-A004-14B99792674C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B56A2B78-70BD-439B-B1ED-A17FA5EF0990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623E4466-82CC-4BDD-BE25-3BB33B585547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF0002A4-8A90-471C-9813-F648D53E4F3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5ECA190-D7D3-4248-A61E-0D87E67E3D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD514B3-AFCD-4CB1-9D1B-18625B771E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A15E0FA-5570-4C5F-B087-38591D9EBABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D9F72B1-F398-4E07-8652-2042ADDB8414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FA2F504-6690-4AAD-97A6-6487E450C92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19B927D3-D766-4D53-9870-15A7184E4C6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54FE202A-E068-4ECE-B61D-230EFF0E60B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B43E22F-D894-4763-BF55-C9B77911C8EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4218D36C-CCE7-443B-842B-AA1A2C865734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3311565E-3971-416B-AC9C-6CF9F4EF0F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC4250E-E638-4015-B5EF-7B5405F7FBFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1B7AA6F-9918-4356-894C-72833B791201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFA48444-F998-425B-896A-CE9276869BA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D9BFC45-39DF-47A6-B013-4299D2A0FB01\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/34294\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200903-30.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1021457\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/963/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/support/kb/view/920/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.opera.com/support/kb/view/922/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/498452/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/498481/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/498499/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/498517/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/498543/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021456\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34294\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200903-30.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1021457\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/linux/963/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/support/kb/view/920/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.opera.com/support/kb/view/922/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/498452/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498481/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498499/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498517/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498543/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021456\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.