FKIE_CVE-2010-1728
Vulnerability from fkie_nvd - Published: 2010-05-06 14:53 - Updated: 2025-04-11 00:51
Severity ?
Summary
Opera before 10.53 on Windows and Mac OS X does not properly handle a series of document modifications that occur asynchronously, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via JavaScript that writes <marquee> sequences in an infinite loop, leading to attempted use of uninitialized memory. NOTE: this might overlap CVE-2006-6955.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4817D56-98D4-404A-B6DF-09D2E739426C",
"versionEndIncluding": "10.52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"matchCriteriaId": "137E9883-BF1D-4B54-A904-AFDE179452A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"matchCriteriaId": "35400232-18B1-4641-8C98-6E8EB3A9C7E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"matchCriteriaId": "90EFC130-7E02-47AE-AC4E-569B59241FF5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Opera before 10.53 on Windows and Mac OS X does not properly handle a series of document modifications that occur asynchronously, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via JavaScript that writes \u003cmarquee\u003e sequences in an infinite loop, leading to attempted use of uninitialized memory. NOTE: this might overlap CVE-2006-6955."
},
{
"lang": "es",
"value": "Opera anterior v10.53 en Windows y Mac OS X no maneja adecuadamente una serie de modificaciones en documentos que ocurren as\u00edncronamente, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (ca\u00edda aplicaci\u00f3n) a trav\u00e9s de JavaScript que escribe secuencias \u003cmarquee\u003e en un bucle infinito, que conduce a un intento de uso de memoria inutilizada. NOTA: esto puede solaparse con CVE-2006-6955.\r\n"
}
],
"id": "CVE-2010-1728",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-05-06T14:53:01.563",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://h.ackack.net/?p=258"
},
{
"source": "cve@mitre.org",
"url": "http://my.opera.com/desktopteam/blog/2010/04/28/opera-10-53-rc1-for-windows-and-mac"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/39590"
},
{
"source": "cve@mitre.org",
"url": "http://www.opera.com/docs/changelogs/mac/1053/"
},
{
"source": "cve@mitre.org",
"url": "http://www.opera.com/docs/changelogs/windows/1053/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.opera.com/support/kb/view/953/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0999"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58231"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://h.ackack.net/?p=258"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://my.opera.com/desktopteam/blog/2010/04/28/opera-10-53-rc1-for-windows-and-mac"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/39590"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.opera.com/docs/changelogs/mac/1053/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.opera.com/docs/changelogs/windows/1053/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.opera.com/support/kb/view/953/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0999"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58231"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11927"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…