var-201006-1130
Vulnerability from variot
Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict certain uses of homograph characters in domain names, which makes it easier for remote attackers to spoof IDN domains via unspecified choices of characters. Opera Web Browser is prone to multiple security vulnerabilities. The impact of these vulnerabilities has not been disclosed. We will update this BID when more information becomes available. Versions prior to Opera 10.54 are vulnerable. It supports multi-window browsing and a customizable user interface. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201206-03
http://security.gentoo.org/
Severity: Normal Title: Opera: Multiple vulnerabilities Date: June 15, 2012 Bugs: #264831, #283391, #290862, #293902, #294208, #294680, #308069, #324189, #325199, #326413, #332449, #348874, #352750, #367837, #373289, #381275, #386217, #387137, #393395, #409857, #415379, #421075 ID: 201206-03
Synopsis
Multiple vulnerabilities have been found in Opera, the worst of which allow for the execution of arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/opera < 12.00.1467 >= 12.00.1467
Description
Multiple vulnerabilities have been discovered in Opera. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could entice a user to open a specially crafted web page, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. A remote attacker may be able to: trick users into downloading and executing arbitrary files, bypass intended access restrictions, spoof trusted content, spoof URLs, bypass the Same Origin Policy, obtain sensitive information, force subscriptions to arbitrary feeds, bypass the popup blocker, bypass CSS filtering, conduct cross-site scripting attacks, or have other unknown impact.
A local attacker could perform symlink attacks to overwrite arbitrary files with the privileges of the user running the application or possibly obtain sensitive information.
A physically proximate attacker may be able to access an email account.
Workaround
There is no known workaround at this time.
Resolution
All Opera users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/opera-12.00.1467"
References
[ 1 ] CVE-2009-1234 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1234 [ 2 ] CVE-2009-2059 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2059 [ 3 ] CVE-2009-2063 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2063 [ 4 ] CVE-2009-2067 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2067 [ 5 ] CVE-2009-2070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2070 [ 6 ] CVE-2009-3013 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3013 [ 7 ] CVE-2009-3044 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3044 [ 8 ] CVE-2009-3045 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3045 [ 9 ] CVE-2009-3046 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3046 [ 10 ] CVE-2009-3047 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3047 [ 11 ] CVE-2009-3048 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3048 [ 12 ] CVE-2009-3049 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3049 [ 13 ] CVE-2009-3831 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3831 [ 14 ] CVE-2009-4071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4071 [ 15 ] CVE-2009-4072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4072 [ 16 ] CVE-2010-0653 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0653 [ 17 ] CVE-2010-1349 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1349 [ 18 ] CVE-2010-1989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1989 [ 19 ] CVE-2010-1993 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1993 [ 20 ] CVE-2010-2121 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2121 [ 21 ] CVE-2010-2421 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2421 [ 22 ] CVE-2010-2455 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2455 [ 23 ] CVE-2010-2576 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2576 [ 24 ] CVE-2010-2658 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2658 [ 25 ] CVE-2010-2659 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2659 [ 26 ] CVE-2010-2660 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2660 [ 27 ] CVE-2010-2661 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2661 [ 28 ] CVE-2010-2662 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2662 [ 29 ] CVE-2010-2663 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2663 [ 30 ] CVE-2010-2664 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2664 [ 31 ] CVE-2010-2665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2665 [ 32 ] CVE-2010-3019 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3019 [ 33 ] CVE-2010-3020 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3020 [ 34 ] CVE-2010-3021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3021 [ 35 ] CVE-2010-4579 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4579 [ 36 ] CVE-2010-4580 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4580 [ 37 ] CVE-2010-4581 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4581 [ 38 ] CVE-2010-4582 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4582 [ 39 ] CVE-2010-4583 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4583 [ 40 ] CVE-2010-4584 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4584 [ 41 ] CVE-2010-4585 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4585 [ 42 ] CVE-2010-4586 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4586 [ 43 ] CVE-2011-0681 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0681 [ 44 ] CVE-2011-0682 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0682 [ 45 ] CVE-2011-0683 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0683 [ 46 ] CVE-2011-0684 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0684 [ 47 ] CVE-2011-0685 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0685 [ 48 ] CVE-2011-0686 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0686 [ 49 ] CVE-2011-0687 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0687 [ 50 ] CVE-2011-1337 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1337 [ 51 ] CVE-2011-1824 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1824 [ 52 ] CVE-2011-2609 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2609 [ 53 ] CVE-2011-2610 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2610 [ 54 ] CVE-2011-2611 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2611 [ 55 ] CVE-2011-2612 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2612 [ 56 ] CVE-2011-2613 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2613 [ 57 ] CVE-2011-2614 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2614 [ 58 ] CVE-2011-2615 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2615 [ 59 ] CVE-2011-2616 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2616 [ 60 ] CVE-2011-2617 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2617 [ 61 ] CVE-2011-2618 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2618 [ 62 ] CVE-2011-2619 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2619 [ 63 ] CVE-2011-2620 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2620 [ 64 ] CVE-2011-2621 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2621 [ 65 ] CVE-2011-2622 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2622 [ 66 ] CVE-2011-2623 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2623 [ 67 ] CVE-2011-2624 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2624 [ 68 ] CVE-2011-2625 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2625 [ 69 ] CVE-2011-2626 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2626 [ 70 ] CVE-2011-2627 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2627 [ 71 ] CVE-2011-2628 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2628 [ 72 ] CVE-2011-2629 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2629 [ 73 ] CVE-2011-2630 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2630 [ 74 ] CVE-2011-2631 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2631 [ 75 ] CVE-2011-2632 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2632 [ 76 ] CVE-2011-2633 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2633 [ 77 ] CVE-2011-2634 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2634 [ 78 ] CVE-2011-2635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2635 [ 79 ] CVE-2011-2636 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2636 [ 80 ] CVE-2011-2637 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2637 [ 81 ] CVE-2011-2638 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2638 [ 82 ] CVE-2011-2639 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2639 [ 83 ] CVE-2011-2640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2640 [ 84 ] CVE-2011-2641 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2641 [ 85 ] CVE-2011-3388 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3388 [ 86 ] CVE-2011-4065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4065 [ 87 ] CVE-2011-4681 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4681 [ 88 ] CVE-2011-4682 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4682 [ 89 ] CVE-2011-4683 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4683 [ 90 ] CVE-2012-1924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1924 [ 91 ] CVE-2012-1925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1925 [ 92 ] CVE-2012-1926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1926 [ 93 ] CVE-2012-1927 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1927 [ 94 ] CVE-2012-1928 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1928 [ 95 ] CVE-2012-1930 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1930 [ 96 ] CVE-2012-1931 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1931 [ 97 ] CVE-2012-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3555 [ 98 ] CVE-2012-3556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3556 [ 99 ] CVE-2012-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3557 [ 100 ] CVE-2012-3558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3558 [ 101 ] CVE-2012-3560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3560 [ 102 ] CVE-2012-3561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3561
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201206-03.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
TITLE: Opera Multiple Unspecified Vulnerabilities
SECUNIA ADVISORY ID: SA40250
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40250/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40250
RELEASE DATE: 2010-06-24
DISCUSS ADVISORY: http://secunia.com/advisories/40250/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/40250/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40250
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Some vulnerabilities with an unknown impact have been reported in Opera.
1) A vulnerability is caused due to an unspecified error.
2) Another vulnerability is caused due to an unspecified error.
3) Another vulnerability is caused due to an unspecified error.
4) Another vulnerability is caused due to an unspecified error.
SOLUTION: Update to version 10.54.
Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.opera.com/docs/changelogs/windows/1054/ http://www.opera.com/support/kb/view/954/
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201006-1130", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "browser", "scope": "eq", "trust": 1.6, "vendor": "opera", "version": "9.20" }, { "model": "browser", "scope": "eq", "trust": 1.6, "vendor": "opera", "version": "9.21" }, { "model": "browser", "scope": "eq", "trust": 1.6, "vendor": "opera", "version": "9.24" }, { "model": "browser", "scope": "eq", "trust": 1.6, "vendor": "opera", "version": "9.12" }, { "model": "browser", "scope": "eq", "trust": 1.6, "vendor": "opera", "version": "9.25" }, { "model": "browser", "scope": "eq", "trust": 1.6, "vendor": "opera", "version": "9.0" }, { "model": "browser", "scope": "eq", "trust": 1.6, "vendor": "opera", "version": "9.10" }, { "model": "browser", "scope": "eq", "trust": 1.6, "vendor": "opera", "version": "9.22" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "10.51" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.01" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.04" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "8.50" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "8.54" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.60" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.62" }, { "model": "browser", "scope": "lte", "trust": 1.0, "vendor": "opera", "version": "10.53" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.51" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.11" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.06" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.02" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "10.11" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.12" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "5.12" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.02" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "8.52" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "5.10" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "10.50" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.64" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.10" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.02" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.52" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.23" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "8.01" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.60" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "10.01" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "10.52" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "10.53" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.05" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "8.0" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.1" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.50" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.54" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.63" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.52" }, { "model": "browser", "scope": "lte", "trust": 1.0, "vendor": "opera", "version": "10.60" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.0" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.26" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.01" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.51" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "5.02" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.27" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.03" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "5.11" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.61" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.11" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.21" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "8.02" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.50" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "6.03" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.01" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "10.00" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "5.0" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.20" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "8.51" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.53" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "8.53" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.22" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "7.0" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "9.23" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": "10.10" }, { "model": "opera", "scope": "lt", "trust": 0.8, "vendor": "opera asa", "version": "for linux 10.60" }, { "model": "opera", "scope": "lt", "trust": 0.8, "vendor": "opera asa", "version": "for mac 10.54" }, { "model": "opera", "scope": "lt", "trust": 0.8, "vendor": "opera asa", "version": "for windows 10.54" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.64" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.63" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.62" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.61" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.60" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.52" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.51" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.27" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.26" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.25" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.24" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.23" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.22" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.21" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.20" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.02" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.53" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.52" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.51" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.50" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.01" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10" }, { "model": "software opera web browser", "scope": "ne", "trust": 0.3, "vendor": "opera", "version": "10.54" } ], "sources": [ { "db": "BID", "id": "40973" }, { "db": "JVNDB", "id": "JVNDB-2010-002043" }, { "db": "NVD", "id": "CVE-2010-2660" }, { "db": "CNNVD", "id": "CNNVD-201007-069" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.53", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.53", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:*:beta1:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.60", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-2660" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Opera", "sources": [ { "db": "CNNVD", "id": "CNNVD-201007-069" } ], "trust": 0.6 }, "cve": "CVE-2010-2660", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2010-2660", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-45265", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-2660", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201007-069", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-45265", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-45265" }, { "db": "JVNDB", "id": "JVNDB-2010-002043" }, { "db": "NVD", "id": "CVE-2010-2660" }, { "db": "CNNVD", "id": "CNNVD-201007-069" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict certain uses of homograph characters in domain names, which makes it easier for remote attackers to spoof IDN domains via unspecified choices of characters. Opera Web Browser is prone to multiple security vulnerabilities. \nThe impact of these vulnerabilities has not been disclosed. We will update this BID when more information becomes available. \nVersions prior to Opera 10.54 are vulnerable. It supports multi-window browsing and a customizable user interface. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201206-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Opera: Multiple vulnerabilities\n Date: June 15, 2012\n Bugs: #264831, #283391, #290862, #293902, #294208, #294680,\n #308069, #324189, #325199, #326413, #332449, #348874,\n #352750, #367837, #373289, #381275, #386217, #387137,\n #393395, #409857, #415379, #421075\n ID: 201206-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Opera, the worst of which\nallow for the execution of arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-client/opera \u003c 12.00.1467 \u003e= 12.00.1467\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Opera. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker could entice a user to open a specially crafted web\npage, possibly resulting in execution of arbitrary code with the\nprivileges of the process or a Denial of Service condition. A remote\nattacker may be able to: trick users into downloading and executing\narbitrary files, bypass intended access restrictions, spoof trusted\ncontent, spoof URLs, bypass the Same Origin Policy, obtain sensitive\ninformation, force subscriptions to arbitrary feeds, bypass the popup\nblocker, bypass CSS filtering, conduct cross-site scripting attacks, or\nhave other unknown impact. \n\nA local attacker could perform symlink attacks to overwrite arbitrary\nfiles with the privileges of the user running the application or\npossibly obtain sensitive information. \n\nA physically proximate attacker may be able to access an email account. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Opera users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-client/opera-12.00.1467\"\n\nReferences\n==========\n\n[ 1 ] CVE-2009-1234\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1234\n[ 2 ] CVE-2009-2059\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2059\n[ 3 ] CVE-2009-2063\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2063\n[ 4 ] CVE-2009-2067\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2067\n[ 5 ] CVE-2009-2070\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2070\n[ 6 ] CVE-2009-3013\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3013\n[ 7 ] CVE-2009-3044\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3044\n[ 8 ] CVE-2009-3045\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3045\n[ 9 ] CVE-2009-3046\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3046\n[ 10 ] CVE-2009-3047\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3047\n[ 11 ] CVE-2009-3048\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3048\n[ 12 ] CVE-2009-3049\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3049\n[ 13 ] CVE-2009-3831\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3831\n[ 14 ] CVE-2009-4071\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4071\n[ 15 ] CVE-2009-4072\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4072\n[ 16 ] CVE-2010-0653\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0653\n[ 17 ] CVE-2010-1349\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1349\n[ 18 ] CVE-2010-1989\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1989\n[ 19 ] CVE-2010-1993\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1993\n[ 20 ] CVE-2010-2121\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2121\n[ 21 ] CVE-2010-2421\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2421\n[ 22 ] CVE-2010-2455\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2455\n[ 23 ] CVE-2010-2576\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2576\n[ 24 ] CVE-2010-2658\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2658\n[ 25 ] CVE-2010-2659\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2659\n[ 26 ] CVE-2010-2660\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2660\n[ 27 ] CVE-2010-2661\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2661\n[ 28 ] CVE-2010-2662\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2662\n[ 29 ] CVE-2010-2663\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2663\n[ 30 ] CVE-2010-2664\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2664\n[ 31 ] CVE-2010-2665\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2665\n[ 32 ] CVE-2010-3019\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3019\n[ 33 ] CVE-2010-3020\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3020\n[ 34 ] CVE-2010-3021\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3021\n[ 35 ] CVE-2010-4579\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4579\n[ 36 ] CVE-2010-4580\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4580\n[ 37 ] CVE-2010-4581\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4581\n[ 38 ] CVE-2010-4582\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4582\n[ 39 ] CVE-2010-4583\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4583\n[ 40 ] CVE-2010-4584\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4584\n[ 41 ] CVE-2010-4585\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4585\n[ 42 ] CVE-2010-4586\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4586\n[ 43 ] CVE-2011-0681\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0681\n[ 44 ] CVE-2011-0682\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0682\n[ 45 ] CVE-2011-0683\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0683\n[ 46 ] CVE-2011-0684\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0684\n[ 47 ] CVE-2011-0685\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0685\n[ 48 ] CVE-2011-0686\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0686\n[ 49 ] CVE-2011-0687\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0687\n[ 50 ] CVE-2011-1337\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1337\n[ 51 ] CVE-2011-1824\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1824\n[ 52 ] CVE-2011-2609\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2609\n[ 53 ] CVE-2011-2610\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2610\n[ 54 ] CVE-2011-2611\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2611\n[ 55 ] CVE-2011-2612\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2612\n[ 56 ] CVE-2011-2613\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2613\n[ 57 ] CVE-2011-2614\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2614\n[ 58 ] CVE-2011-2615\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2615\n[ 59 ] CVE-2011-2616\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2616\n[ 60 ] CVE-2011-2617\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2617\n[ 61 ] CVE-2011-2618\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2618\n[ 62 ] CVE-2011-2619\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2619\n[ 63 ] CVE-2011-2620\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2620\n[ 64 ] CVE-2011-2621\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2621\n[ 65 ] CVE-2011-2622\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2622\n[ 66 ] CVE-2011-2623\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2623\n[ 67 ] CVE-2011-2624\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2624\n[ 68 ] CVE-2011-2625\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2625\n[ 69 ] CVE-2011-2626\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2626\n[ 70 ] CVE-2011-2627\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2627\n[ 71 ] CVE-2011-2628\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2628\n[ 72 ] CVE-2011-2629\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2629\n[ 73 ] CVE-2011-2630\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2630\n[ 74 ] CVE-2011-2631\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2631\n[ 75 ] CVE-2011-2632\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2632\n[ 76 ] CVE-2011-2633\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2633\n[ 77 ] CVE-2011-2634\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2634\n[ 78 ] CVE-2011-2635\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2635\n[ 79 ] CVE-2011-2636\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2636\n[ 80 ] CVE-2011-2637\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2637\n[ 81 ] CVE-2011-2638\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2638\n[ 82 ] CVE-2011-2639\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2639\n[ 83 ] CVE-2011-2640\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2640\n[ 84 ] CVE-2011-2641\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2641\n[ 85 ] CVE-2011-3388\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3388\n[ 86 ] CVE-2011-4065\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4065\n[ 87 ] CVE-2011-4681\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4681\n[ 88 ] CVE-2011-4682\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4682\n[ 89 ] CVE-2011-4683\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4683\n[ 90 ] CVE-2012-1924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1924\n[ 91 ] CVE-2012-1925\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1925\n[ 92 ] CVE-2012-1926\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1926\n[ 93 ] CVE-2012-1927\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1927\n[ 94 ] CVE-2012-1928\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1928\n[ 95 ] CVE-2012-1930\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1930\n[ 96 ] CVE-2012-1931\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1931\n[ 97 ] CVE-2012-3555\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3555\n[ 98 ] CVE-2012-3556\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3556\n[ 99 ] CVE-2012-3557\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3557\n[ 100 ] CVE-2012-3558\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3558\n[ 101 ] CVE-2012-3560\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3560\n[ 102 ] CVE-2012-3561\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3561\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201206-03.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. ----------------------------------------------------------------------\n\n\nSecunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management\n\nFree webinars\n\nhttp://secunia.com/vulnerability_scanning/corporate/webinars/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nOpera Multiple Unspecified Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA40250\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/40250/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40250\n\nRELEASE DATE:\n2010-06-24\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/40250/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/40250/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40250\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nSome vulnerabilities with an unknown impact have been reported in\nOpera. \n\n1) A vulnerability is caused due to an unspecified error. \n\n2) Another vulnerability is caused due to an unspecified error. \n\n3) Another vulnerability is caused due to an unspecified error. \n\n4) Another vulnerability is caused due to an unspecified error. \n\nSOLUTION:\nUpdate to version 10.54. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.opera.com/docs/changelogs/windows/1054/\nhttp://www.opera.com/support/kb/view/954/\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2010-2660" }, { "db": "JVNDB", "id": "JVNDB-2010-002043" }, { "db": "BID", "id": "40973" }, { "db": "VULHUB", "id": "VHN-45265" }, { "db": "PACKETSTORM", "id": "113738" }, { "db": "PACKETSTORM", "id": "90927" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-2660", "trust": 2.9 }, { "db": "BID", "id": "40973", "trust": 2.8 }, { "db": "SECUNIA", "id": "40250", "trust": 2.6 }, { "db": "VUPEN", "id": "ADV-2010-1529", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2010-1673", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2010-002043", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201007-069", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-45265", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113738", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "90927", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-45265" }, { "db": "BID", "id": "40973" }, { "db": "JVNDB", "id": "JVNDB-2010-002043" }, { "db": "PACKETSTORM", "id": "113738" }, { "db": "PACKETSTORM", "id": "90927" }, { "db": "NVD", "id": "CVE-2010-2660" }, { "db": "CNNVD", "id": "CNNVD-201007-069" } ] }, "id": "VAR-201006-1130", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-45265" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:11:17.594000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "windows/1054", "trust": 0.8, "url": "http://www.opera.com/docs/changelogs/windows/1054" }, { "title": "mac/1054", "trust": 0.8, "url": "http://www.opera.com/docs/changelogs/mac/1054" }, { "title": "unix/1060", "trust": 0.8, "url": "http://www.opera.com/docs/changelogs/unix/1060" }, { "title": "961", "trust": 0.8, "url": "http://www.opera.com/support/kb/view/961" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002043" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-45265" }, { "db": "JVNDB", "id": "JVNDB-2010-002043" }, { "db": "NVD", "id": "CVE-2010-2660" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/40973" }, { "trust": 2.5, "url": "http://secunia.com/advisories/40250" }, { "trust": 2.5, "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "trust": 2.5, "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "trust": 2.1, "url": "http://www.opera.com/docs/changelogs/windows/1054/" }, { "trust": 1.7, "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "trust": 1.7, "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "trust": 1.7, "url": "http://www.opera.com/support/search/view/961/" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11603" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2660" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2660" }, { "trust": 0.3, "url": "http://www.opera.com/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2664" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0683" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2121" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2609" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3045" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2659" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2635" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3048" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1924" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1824" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2625" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2063" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1349" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4586" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4681" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4071" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2631" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2067" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2638" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0687" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2660" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2059" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2070" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3557" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3046" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3048" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3044" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4580" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2624" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0653" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2070" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1928" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3021" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2613" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1989" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3831" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2611" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2658" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201206-03.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3020" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2629" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1926" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2622" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2632" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2659" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2636" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2617" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2067" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4582" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2639" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0684" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2634" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2633" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2612" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3561" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2576" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0686" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4065" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2663" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1349" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2421" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1925" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2616" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4683" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0653" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4585" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3047" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2615" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2640" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2628" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3049" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2660" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2620" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2619" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1234" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2641" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2618" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4579" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4071" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2665" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4072" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3831" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3047" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2662" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2637" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3049" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0681" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2630" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2455" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1927" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2661" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1989" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2455" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3558" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3013" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2626" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0685" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2658" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3560" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3045" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2610" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2623" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2059" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0682" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1234" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2121" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4581" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1930" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3046" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1993" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2662" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1993" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3388" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2627" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1337" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3013" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2614" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2661" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2063" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1931" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2621" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3556" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4584" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4682" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3019" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4072" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3044" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2576" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4583" }, { "trust": 0.1, "url": "http://secunia.com/advisories/40250/#comments" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/webinars/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.opera.com/support/kb/view/954/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40250" }, { "trust": 0.1, "url": "http://secunia.com/advisories/40250/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-45265" }, { "db": "BID", "id": "40973" }, { "db": "JVNDB", "id": "JVNDB-2010-002043" }, { "db": "PACKETSTORM", "id": "113738" }, { "db": "PACKETSTORM", "id": "90927" }, { "db": "NVD", "id": "CVE-2010-2660" }, { "db": "CNNVD", "id": "CNNVD-201007-069" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-45265" }, { "db": "BID", "id": "40973" }, { "db": "JVNDB", "id": "JVNDB-2010-002043" }, { "db": "PACKETSTORM", "id": "113738" }, { "db": "PACKETSTORM", "id": "90927" }, { "db": "NVD", "id": "CVE-2010-2660" }, { "db": "CNNVD", "id": "CNNVD-201007-069" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-07-08T00:00:00", "db": "VULHUB", "id": "VHN-45265" }, { "date": "2010-06-21T00:00:00", "db": "BID", "id": "40973" }, { "date": "2010-09-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002043" }, { "date": "2012-06-16T00:30:10", "db": "PACKETSTORM", "id": "113738" }, { "date": "2010-06-24T15:46:36", "db": "PACKETSTORM", "id": "90927" }, { "date": "2010-07-08T12:54:47.333000", "db": "NVD", "id": "CVE-2010-2660" }, { "date": "2010-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201007-069" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-45265" }, { "date": "2015-04-13T21:02:00", "db": "BID", "id": "40973" }, { "date": "2010-09-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002043" }, { "date": "2018-10-30T16:26:33.437000", "db": "NVD", "id": "CVE-2010-2660" }, { "date": "2010-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201007-069" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201007-069" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Opera In IDN Vulnerability impersonating a domain", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002043" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201007-069" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.