{"id": "OPENVAS:802741", "type": "openvas", "bulletinFamily": "scanner", "title": "Opera Browser Multiple Vulnerabilities-02 July-11 (Linux)", "description": "The host is installed with Opera browser and is prone to multiple\n vulnerabilities.", "published": "2012-04-10T00:00:00", "modified": "2017-04-10T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=802741", "reporter": "Copyright (c) 2012 Greenbone Networks GmbH", "references": ["http://www.opera.com/docs/changelogs/unix/1110/"], "cvelist": ["CVE-2011-2640", "CVE-2011-2634", "CVE-2011-2639", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2638", "CVE-2011-2637"], "lastseen": "2017-07-02T21:10:35", "viewCount": 2, "enchantments": {"score": {"value": 0.2, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-2634", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2637", "CVE-2011-2638", "CVE-2011-2639", "CVE-2011-2640"]}, {"type": "gentoo", "idList": ["GLSA-201206-03"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/GENTOO-LINUX-CVE-2011-2636/"]}, {"type": "nessus", "idList": ["5988.PRM", "800862.PRM", "GENTOO_GLSA-201206-03.NASL", "OPERA_1110.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:136141256231071547", "OPENVAS:1361412562310802112", "OPENVAS:1361412562310802741", "OPENVAS:1361412562310802756", "OPENVAS:71547", "OPENVAS:802112", "OPENVAS:802756"]}]}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2011-2634", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2637", "CVE-2011-2638", "CVE-2011-2639", "CVE-2011-2640"]}, {"type": "gentoo", "idList": ["GLSA-201206-03"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/GENTOO-LINUX-CVE-2011-2636/"]}, {"type": "nessus", "idList": ["OPERA_1110.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310802756"]}]}, "exploitation": null, "vulnersScore": 0.2}, "pluginID": "802741", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_opera_mult_vuln_lin02_jul11.nasl 5912 2017-04-10 09:01:51Z teissa $\n#\n# Opera Browser Multiple Vulnerabilities-02 July-11 (Linux)\n#\n# Authors:\n# Madhuri D <dmadhuri@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow remote attackers to execute arbitrary code\n and cause a denial of service.\n Impact Level: System/Application\";\ntag_affected = \"Opera Web Browser version prior 11.10 on Linux\";\ntag_insight = \"The flaws are due to\n - An error in cascading Style Sheets (CSS) implementation, allows attackers\n to cause denial of service via vectors involving use of the hover pseudo\n class.\n - A Hijacking searches and other customisations in Opera.\n - An error Tomato Firmware v1.28.1816 Status Device List page in Opera.\n - Crashes on futura-sciences.com, seoptimise.com, mitosyfraudes.org.\n - Crash occurring with games on zylom.com.\n - A Hidden animated '.gif' causing high CPU load, because of constant repaints.\n - A crash when passing empty parameter to a Java applet.\";\ntag_solution = \"Upgrade to Opera Web Browser version 11.10 or later,\n For updates refer to http://www.opera.com/download/\";\ntag_summary = \"The host is installed with Opera browser and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(802741);\n script_version(\"$Revision: 5912 $\");\n script_cve_id(\"CVE-2011-2635\", \"CVE-2011-2634\", \"CVE-2011-2636\", \"CVE-2011-2637\",\n \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\");\n script_bugtraq_id(48569);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-10 11:01:51 +0200 (Mon, 10 Apr 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-10 12:16:51 +0530 (Tue, 10 Apr 2012)\");\n script_name(\"Opera Browser Multiple Vulnerabilities-02 July-11 (Linux)\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/docs/changelogs/unix/1110/\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_opera_detection_linux_900037.nasl\");\n script_require_keys(\"Opera/Linux/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Variable Initialization\noperaVer = \"\";\n\n## Get Opera Version from KB\noperaVer = get_kb_item(\"Opera/Linux/Version\");\nif(!operaVer){\n exit(0);\n}\n\n## Grep for Opera Versions prior to 11.10\nif(version_is_less(version:operaVer, test_version:\"11.10\")){\n security_message(0);\n}\n", "naslFamily": "General", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647589307, "score": 1659709850}}
{"nessus": [{"lastseen": "2023-01-11T14:33:51", "description": "The version of Opera installed on the remote Windows host is earlier than 11.10 and thus is potentially affected by the following vulnerabilities :\n\n - An unspecified vulnerability allows remote attackers to hijack searches and customizations using unspecified third-party applications. (CVE-2011-2634)\n\n - Several errors exist that can cause application crashes. Affected items or functionalities are the handling of the CSS pseudo-class ':hover' if used with transforms on a floated element, unspecified web content, and the handling of an embedded Java applet with empty parameters. (CVE-2011-2635, CVE-2011-2636, CVE-2011-2637, CVE-2011-2638, CVE-2011-2640)\n\n - An error in the handling of hidden animated GIF images can cause a denial of service through CPU consumption as image repaints are triggered. (CVE-2011-2639)", "cvss3": {}, "published": "2011-07-05T00:00:00", "type": "nessus", "title": "Opera < 11.10 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2634", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2637", "CVE-2011-2638", "CVE-2011-2639", "CVE-2011-2640"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/a:opera:opera_browser"], "id": "OPERA_1110.NASL", "href": "https://www.tenable.com/plugins/nessus/55506", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(55506);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2018/11/15 20:50:27\");\n\n script_cve_id(\n \"CVE-2011-2634\",\n \"CVE-2011-2635\",\n \"CVE-2011-2636\",\n \"CVE-2011-2637\",\n \"CVE-2011-2638\",\n \"CVE-2011-2639\",\n \"CVE-2011-2640\"\n );\n script_bugtraq_id(48569, 48634);\n\n script_name(english:\"Opera < 11.10 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version number of Opera\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host contains a web browser that is affected by multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Opera installed on the remote Windows host is earlier\nthan 11.10 and thus is potentially affected by the following\nvulnerabilities :\n\n - An unspecified vulnerability allows remote attackers\n to hijack searches and customizations using unspecified\n third-party applications. (CVE-2011-2634)\n\n - Several errors exist that can cause application\n crashes. Affected items or functionalities are the\n handling of the CSS pseudo-class ':hover' if used\n with transforms on a floated element, unspecified web\n content, and the handling of an embedded Java applet\n with empty parameters. (CVE-2011-2635, CVE-2011-2636,\n CVE-2011-2637, CVE-2011-2638, CVE-2011-2640)\n\n - An error in the handling of hidden animated GIF \n images can cause a denial of service through CPU\n consumption as image repaints are triggered. \n (CVE-2011-2639)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://web.archive.org/web/20170916114750/http://www.opera.com:80/docs/changelogs/windows/1110/\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Opera 11.10 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/07/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/07/05\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:opera:opera_browser\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"opera_installed.nasl\");\n script_require_keys(\"SMB/Opera/Version\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"SMB/Opera/Version\");\n\nversion_ui = get_kb_item(\"SMB/Opera/Version_UI\");\nif (isnull(version_ui)) version_report = version;\nelse version_report = version_ui;\n\nfixed_version = \"11.10.2092.0\";\n\n# Check if we need to display full version info in case of Alpha/Beta/RC\nmajor_minor = eregmatch(string:version, pattern:\"^([0-9]+\\.[0-9]+)\");\nif (major_minor[1] == \"11.10\")\n{\n fixed_version_report = fixed_version;\n version_report = version;\n}\nelse\n fixed_version_report = \"11.10\";\n\nif (ver_compare(ver:version, fix:fixed_version) == -1)\n{\n if (report_verbosity > 0)\n {\n install_path = get_kb_item(\"SMB/Opera/Path\");\n\n report = \n '\\n Path : ' + install_path +\n '\\n Installed version : ' + version_report +\n '\\n Fixed version : ' + fixed_version_report +\n '\\n';\n security_warning(port:get_kb_item(\"SMB/transport\"), extra:report);\n }\n else security_warning(port:get_kb_item(\"SMB/transport\"));\n exit(0);\n}\nelse exit(0, \"The host is not affected since Opera \"+version_report+\" is installed.\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2023-01-11T14:33:47", "description": "The remote host is running the Opera web browser. \n\nVersions of Opera earlier than 11.10 are potentially affected by multiple vulnerabilities : - An unspecified vulnerability allows remote attackers to hijack searches and customizations using unspecified third-party applications. (CVE-2011-2634)\n\n - Several errors exist that can cause application crashes. Affected items or functionalities are the handling of the CSS pseudo-class ': hover' if used with transforms on a floated element, unspecified web content, and the handling of an embedded Java applet with empty parameters. (CVE-2011-2635, CVE-2011-2636, CVE-2011-2637, CVE-2011-2638, CVE-2011-2640)\n\n - An error in the handling of hidden animated GIF images can cause a denial of service through CPU consumption as image repaints are triggered. (CVE-2011-2639)", "cvss3": {}, "published": "2011-07-05T00:00:00", "type": "nessus", "title": "Opera < 11.10 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2634", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2637", "CVE-2011-2638", "CVE-2011-2639", "CVE-2011-2640"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*"], "id": "5988.PRM", "href": "https://www.tenable.com/plugins/nnm/5988", "sourceData": "Binary data 5988.prm", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2023-01-11T14:33:44", "description": "The remote host is running the Opera web browser.\n\nVersions of Opera earlier than 11.10 are potentially affected by multiple vulnerabilities : - An unspecified vulnerability allows remote attackers to hijack searches and customizations using unspecified third-party applications. (CVE-2011-2634)\n\n - Several errors exist that can cause application crashes. Affected items or functionalities are the handling of the CSS pseudo-class ': hover' if used with transforms on a floated element, unspecified web content, and the handling of an embedded Java applet with empty parameters. (CVE-2011-2635, CVE-2011-2636, CVE-2011-2637, CVE-2011-2638, CVE-2011-2640)\n\n - An error in the handling of hidden animated GIF images can cause a denial of service through CPU consumption as image repaints are triggered. (CVE-2011-2639)", "cvss3": {}, "published": "2011-07-05T00:00:00", "type": "nessus", "title": "Opera < 11.10 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2634", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2637", "CVE-2011-2638", "CVE-2011-2639", "CVE-2011-2640"], "modified": "2011-07-05T00:00:00", "cpe": [], "id": "800862.PRM", "href": "https://www.tenable.com/plugins/lce/800862", "sourceData": "Binary data 800862.prm", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2023-01-11T14:24:35", "description": "The remote host is affected by the vulnerability described in GLSA-201206-03 (Opera: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Opera. Please review the CVE identifiers referenced below for details.\n Impact :\n\n A remote attacker could entice a user to open a specially crafted web page, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. A remote attacker may be able to: trick users into downloading and executing arbitrary files, bypass intended access restrictions, spoof trusted content, spoof URLs, bypass the Same Origin Policy, obtain sensitive information, force subscriptions to arbitrary feeds, bypass the popup blocker, bypass CSS filtering, conduct cross-site scripting attacks, or have other unknown impact.\n A local attacker could perform symlink attacks to overwrite arbitrary files with the privileges of the user running the application or possibly obtain sensitive information.\n A physically proximate attacker may be able to access an email account.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {}, "published": "2012-06-21T00:00:00", "type": "nessus", "title": "GLSA-201206-03 : Opera: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": true, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-1234", "CVE-2009-2059", "CVE-2009-2063", "CVE-2009-2067", "CVE-2009-2070", "CVE-2009-3013", "CVE-2009-3044", "CVE-2009-3045", "CVE-2009-3046", "CVE-2009-3047", "CVE-2009-3048", "CVE-2009-3049", "CVE-2009-3831", "CVE-2009-4071", "CVE-2009-4072", "CVE-2010-0653", "CVE-2010-1349", "CVE-2010-1989", "CVE-2010-1993", "CVE-2010-2121", "CVE-2010-2421", "CVE-2010-2455", "CVE-2010-2576", "CVE-2010-2658", "CVE-2010-2659", "CVE-2010-2660", "CVE-2010-2661", "CVE-2010-2662", "CVE-2010-2663", "CVE-2010-2664", "CVE-2010-2665", "CVE-2010-3019", "CVE-2010-3020", "CVE-2010-3021", "CVE-2010-4579", "CVE-2010-4580", "CVE-2010-4581", "CVE-2010-4582", "CVE-2010-4583", "CVE-2010-4584", "CVE-2010-4585", "CVE-2010-4586", "CVE-2011-0681", "CVE-2011-0682", "CVE-2011-0683", "CVE-2011-0684", "CVE-2011-0685", "CVE-2011-0686", "CVE-2011-0687", "CVE-2011-1337", "CVE-2011-1824", "CVE-2011-2609", "CVE-2011-2610", "CVE-2011-2611", "CVE-2011-2612", "CVE-2011-2613", "CVE-2011-2614", "CVE-2011-2615", "CVE-2011-2616", "CVE-2011-2617", "CVE-2011-2618", "CVE-2011-2619", "CVE-2011-2620", "CVE-2011-2621", "CVE-2011-2622", "CVE-2011-2623", "CVE-2011-2624", "CVE-2011-2625", "CVE-2011-2626", "CVE-2011-2627", "CVE-2011-2628", "CVE-2011-2629", "CVE-2011-2630", "CVE-2011-2631", "CVE-2011-2632", "CVE-2011-2633", "CVE-2011-2634", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2637", "CVE-2011-2638", "CVE-2011-2639", "CVE-2011-2640", "CVE-2011-2641", "CVE-2011-3388", "CVE-2011-4065", "CVE-2011-4681", "CVE-2011-4682", "CVE-2011-4683", "CVE-2012-1924", "CVE-2012-1925", "CVE-2012-1926", "CVE-2012-1927", "CVE-2012-1928", "CVE-2012-1930", "CVE-2012-1931", "CVE-2012-3555", "CVE-2012-3556", "CVE-2012-3557", "CVE-2012-3558", "CVE-2012-3560", "CVE-2012-3561"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:opera", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201206-03.NASL", "href": "https://www.tenable.com/plugins/nessus/59631", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201206-03.\n#\n# The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(59631);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-1234\", \"CVE-2009-2059\", \"CVE-2009-2063\", \"CVE-2009-2067\", \"CVE-2009-2070\", \"CVE-2009-3013\", \"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\", \"CVE-2009-3047\", \"CVE-2009-3048\", \"CVE-2009-3049\", \"CVE-2009-3831\", \"CVE-2009-4071\", \"CVE-2009-4072\", \"CVE-2010-0653\", \"CVE-2010-1349\", \"CVE-2010-1989\", \"CVE-2010-1993\", \"CVE-2010-2121\", \"CVE-2010-2421\", \"CVE-2010-2455\", \"CVE-2010-2576\", \"CVE-2010-2658\", \"CVE-2010-2659\", \"CVE-2010-2660\", \"CVE-2010-2661\", \"CVE-2010-2662\", \"CVE-2010-2663\", \"CVE-2010-2664\", \"CVE-2010-2665\", \"CVE-2010-3019\", \"CVE-2010-3020\", \"CVE-2010-3021\", \"CVE-2010-4579\", \"CVE-2010-4580\", \"CVE-2010-4581\", \"CVE-2010-4582\", \"CVE-2010-4583\", \"CVE-2010-4584\", \"CVE-2010-4585\", \"CVE-2010-4586\", \"CVE-2011-0681\", \"CVE-2011-0682\", \"CVE-2011-0683\", \"CVE-2011-0684\", \"CVE-2011-0685\", \"CVE-2011-0686\", \"CVE-2011-0687\", \"CVE-2011-1337\", \"CVE-2011-1824\", \"CVE-2011-2609\", \"CVE-2011-2610\", \"CVE-2011-2611\", \"CVE-2011-2612\", \"CVE-2011-2613\", \"CVE-2011-2614\", \"CVE-2011-2615\", \"CVE-2011-2616\", \"CVE-2011-2617\", \"CVE-2011-2618\", \"CVE-2011-2619\", \"CVE-2011-2620\", \"CVE-2011-2621\", \"CVE-2011-2622\", \"CVE-2011-2623\", \"CVE-2011-2624\", \"CVE-2011-2625\", \"CVE-2011-2626\", \"CVE-2011-2627\", \"CVE-2011-2628\", \"CVE-2011-2629\", \"CVE-2011-2630\", \"CVE-2011-2631\", \"CVE-2011-2632\", \"CVE-2011-2633\", \"CVE-2011-2634\", \"CVE-2011-2635\", \"CVE-2011-2636\", \"CVE-2011-2637\", \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\", \"CVE-2011-2641\", \"CVE-2011-3388\", \"CVE-2011-4065\", \"CVE-2011-4681\", \"CVE-2011-4682\", \"CVE-2011-4683\", \"CVE-2012-1924\", \"CVE-2012-1925\", \"CVE-2012-1926\", \"CVE-2012-1927\", \"CVE-2012-1928\", \"CVE-2012-1930\", \"CVE-2012-1931\", \"CVE-2012-3555\", \"CVE-2012-3556\", \"CVE-2012-3557\", \"CVE-2012-3558\", \"CVE-2012-3560\", \"CVE-2012-3561\");\n script_xref(name:\"GLSA\", value:\"201206-03\");\n\n script_name(english:\"GLSA-201206-03 : Opera: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201206-03\n(Opera: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Opera. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could entice a user to open a specially crafted web\n page, possibly resulting in execution of arbitrary code with the\n privileges of the process or a Denial of Service condition. A remote\n attacker may be able to: trick users into downloading and executing\n arbitrary files, bypass intended access restrictions, spoof trusted\n content, spoof URLs, bypass the Same Origin Policy, obtain sensitive\n information, force subscriptions to arbitrary feeds, bypass the popup\n blocker, bypass CSS filtering, conduct cross-site scripting attacks, or\n have other unknown impact.\n A local attacker could perform symlink attacks to overwrite arbitrary\n files with the privileges of the user running the application or possibly\n obtain sensitive information.\n A physically proximate attacker may be able to access an email account.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201206-03\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Opera users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/opera-12.00.1467'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(16, 20, 79, 94, 264, 287, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:opera\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/04/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/opera\", unaffected:make_list(\"ge 12.00.1467\"), vulnerable:make_list(\"lt 12.00.1467\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Opera\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2020-04-26T15:08:53", "description": "The host is installed with Opera browser and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-04-10T00:00:00", "type": "openvas", "title": "Opera Browser Multiple Vulnerabilities-02 July-11 (Linux)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-2640", "CVE-2011-2634", "CVE-2011-2639", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2638", "CVE-2011-2637"], "modified": "2020-04-22T00:00:00", "id": "OPENVAS:1361412562310802741", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310802741", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Opera Browser Multiple Vulnerabilities-02 July-11 (Linux)\n#\n# Authors:\n# Madhuri D <dmadhuri@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.802741\");\n script_version(\"2020-04-22T10:27:30+0000\");\n script_cve_id(\"CVE-2011-2635\", \"CVE-2011-2634\", \"CVE-2011-2636\", \"CVE-2011-2637\",\n \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\");\n script_bugtraq_id(48569);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-22 10:27:30 +0000 (Wed, 22 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-04-10 12:16:51 +0530 (Tue, 10 Apr 2012)\");\n script_name(\"Opera Browser Multiple Vulnerabilities-02 July-11 (Linux)\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/docs/changelogs/unix/1110/\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_dependencies(\"secpod_opera_detection_linux_900037.nasl\");\n script_mandatory_keys(\"Opera/Linux/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to execute arbitrary code\n and cause a denial of service.\");\n script_tag(name:\"affected\", value:\"Opera Web Browser version prior 11.10 on Linux\");\n script_tag(name:\"insight\", value:\"The flaws are due to\n\n - An error in cascading Style Sheets (CSS) implementation, allows attackers\n to cause denial of service via vectors involving use of the hover pseudo\n class.\n\n - A Hijacking searches and other customisations in Opera.\n\n - An error Tomato Firmware v1.28.1816 Status Device List page in Opera.\n\n - Crashes on futura-sciences.com, seoptimise.com, mitosyfraudes.org.\n\n - Crash occurring with games on zylom.com.\n\n - A Hidden animated '.gif' causing high CPU load, because of constant repaints.\n\n - A crash when passing empty parameter to a Java applet.\");\n script_tag(name:\"solution\", value:\"Upgrade to Opera Web Browser version 11.10 or later.\");\n script_tag(name:\"summary\", value:\"The host is installed with Opera browser and is prone to multiple\n vulnerabilities.\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/download/\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\noperaVer = get_kb_item(\"Opera/Linux/Version\");\nif(!operaVer){\n exit(0);\n}\n\nif(version_is_less(version:operaVer, test_version:\"11.10\")){\n report = report_fixed_ver(installed_version:operaVer, fixed_version:\"11.10\");\n security_message(port:0, data:report);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-04-27T19:23:01", "description": "The host is installed with Opera browser and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2011-07-05T00:00:00", "type": "openvas", "title": "Opera Browser Multiple Vulnerabilities Jul-11 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-2640", "CVE-2011-2634", "CVE-2011-2639", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2638", "CVE-2011-2637"], "modified": "2020-04-23T00:00:00", "id": "OPENVAS:1361412562310802112", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310802112", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Opera Browser Multiple Vulnerabilities July-11 (Windows)\n#\n# Authors:\n# Madhuri D <dmadhuri@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.802112\");\n script_version(\"2020-04-23T08:43:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-23 08:43:39 +0000 (Thu, 23 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2011-07-05 13:15:06 +0200 (Tue, 05 Jul 2011)\");\n script_cve_id(\"CVE-2011-2635\", \"CVE-2011-2634\", \"CVE-2011-2636\",\n \"CVE-2011-2637\", \"CVE-2011-2638\", \"CVE-2011-2639\",\n \"CVE-2011-2640\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Opera Browser Multiple Vulnerabilities Jul-11 (Windows)\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/docs/changelogs/windows/1110/\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_opera_detect_portable_win.nasl\");\n script_mandatory_keys(\"Opera/Win/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to execute arbitrary code\n and cause a denial of service.\");\n script_tag(name:\"affected\", value:\"Opera Web Browser Version prior 11.10\");\n script_tag(name:\"insight\", value:\"The flaws are due to\n\n - An error in cascading Style Sheets (CSS) implementation, allows attackers\n to cause denial of service via vectors involving use of the :hover\n pseudo-class.\n\n - Hijacking searches and other customisations in Opera.\n\n - An error Tomato Firmware v1.28.1816 Status Device List page in Opera.\n\n - Crashes on futura-sciences.com, seoptimise.com, mitosyfraudes.org.\n\n - Crash occurring with games on zylom.com.\n\n - Hidden animated '.gif' causing high CPU load, because of constant repaints.\n\n - Crash when passing empty parameter to a Java applet.\");\n script_tag(name:\"solution\", value:\"Upgrade to Opera Web Browser Version 11.10 or later.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"The host is installed with Opera browser and is prone to multiple\n vulnerabilities.\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/download/\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\noperaVer = get_kb_item(\"Opera/Win/Version\");\n\nif(operaVer)\n{\n if(version_is_less(version:operaVer, test_version:\"11.10\")){\n report = report_fixed_ver(installed_version:operaVer, fixed_version:\"11.10\");\n security_message(port: 0, data: report);\n exit(0);\n }\n}\n\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2017-09-04T14:19:49", "description": "The host is installed with Opera browser and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2011-07-05T00:00:00", "type": "openvas", "title": "Opera Browser Multiple Vulnerabilities Jul-11 (Windows)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-2640", "CVE-2011-2634", "CVE-2011-2639", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2638", "CVE-2011-2637"], "modified": "2017-08-25T00:00:00", "id": "OPENVAS:802112", "href": "http://plugins.openvas.org/nasl.php?oid=802112", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_opera_mult_vuln_win02_jul11.nasl 7006 2017-08-25 11:51:20Z teissa $\n#\n# Opera Browser Multiple Vulnerabilities July-11 (Windows)\n#\n# Authors:\n# Madhuri D <dmadhuri@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow remote attackers to execute arbitrary code\n and cause a denial of service.\n Impact Level: System/Application\";\ntag_affected = \"Opera Web Browser Version prior 11.10\";\ntag_insight = \"The flaws are due to\n - An error in cascading Style Sheets (CSS) implementation, allows attackers\n to cause denial of service via vectors involving use of the :hover\n pseudo-class.\n - Hijacking searches and other customisations in Opera.\n - An error Tomato Firmware v1.28.1816 Status Device List page in Opera.\n - Crashes on futura-sciences.com, seoptimise.com, mitosyfraudes.org.\n - Crash occurring with games on zylom.com.\n - Hidden animated '.gif' causing high CPU load, because of constant repaints.\n - Crash when passing empty parameter to a Java applet.\";\ntag_solution = \"Upgrade to Opera Web Browser Version 11.10 or later,\n For updates refer to http://www.opera.com/download/\";\ntag_summary = \"The host is installed with Opera browser and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(802112);\n script_version(\"$Revision: 7006 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-08-25 13:51:20 +0200 (Fri, 25 Aug 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-07-05 13:15:06 +0200 (Tue, 05 Jul 2011)\");\n script_cve_id(\"CVE-2011-2635\", \"CVE-2011-2634\", \"CVE-2011-2636\",\n \"CVE-2011-2637\", \"CVE-2011-2638\", \"CVE-2011-2639\",\n \"CVE-2011-2640\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Opera Browser Multiple Vulnerabilities Jul-11 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/docs/changelogs/windows/1110/\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_opera_detection_win_900036.nasl\");\n script_require_keys(\"Opera/Win/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Get Opera Version from KB\noperaVer = get_kb_item(\"Opera/Win/Version\");\n\nif(operaVer)\n{\n ## Grep for Opera Versions prior to 11.10\n if(version_is_less(version:operaVer, test_version:\"11.10\")){\n security_message(0);\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-02T21:10:35", "description": "The host is installed with Opera browser and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-04-19T00:00:00", "type": "openvas", "title": "Opera Browser Multiple Vulnerabilities-02 July-11 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-2640", "CVE-2011-2634", "CVE-2011-2639", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2638", "CVE-2011-2637"], "modified": "2017-04-13T00:00:00", "id": "OPENVAS:802756", "href": "http://plugins.openvas.org/nasl.php?oid=802756", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_opera_mult_vuln2_macosx_july11.nasl 5950 2017-04-13 09:02:06Z teissa $\n#\n# Opera Browser Multiple Vulnerabilities-02 July-11 (Mac OS X)\n#\n# Authors:\n# Madhuri D <dmadhuri@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow remote attackers to execute arbitrary code\n and cause a denial of service.\n Impact Level: System/Application\";\ntag_affected = \"Opera Web Browser version prior 11.10 on Mac OS X\";\ntag_insight = \"The flaws are due to\n - An error in cascading Style Sheets (CSS) implementation, allows attackers\n to cause denial of service via vectors involving use of the hover pseudo\n class.\n - A Hijacking searches and other customisations in Opera.\n - An error Tomato Firmware v1.28.1816 Status Device List page in Opera.\n - Crashes on futura-sciences.com, seoptimise.com, mitosyfraudes.org.\n - Crash occurring with games on zylom.com.\n - A Hidden animated '.gif' causing high CPU load, because of constant repaints.\n - A crash when passing empty parameter to a Java applet.\";\ntag_solution = \"Upgrade to Opera Web Browser version 11.10 or later,\n For updates refer to http://www.opera.com/download/\";\ntag_summary = \"The host is installed with Opera browser and is prone to multiple\n vulnerabilities.\";\n\nif(description)\n{\n script_id(802756);\n script_version(\"$Revision: 5950 $\");\n script_cve_id(\"CVE-2011-2635\", \"CVE-2011-2634\", \"CVE-2011-2636\", \"CVE-2011-2637\",\n \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-13 11:02:06 +0200 (Thu, 13 Apr 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-19 11:33:54 +0530 (Thu, 19 Apr 2012)\");\n script_name(\"Opera Browser Multiple Vulnerabilities-02 July-11 (Mac OS X)\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/68452\");\n script_xref(name : \"URL\" , value : \"http://www.opera.com/docs/changelogs/mac/1110/\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_opera_detect_macosx.nasl\");\n script_require_keys(\"Opera/MacOSX/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Variable Initialization\noperaVer = \"\";\n\n## Get Opera Version from KB\noperaVer = get_kb_item(\"Opera/MacOSX/Version\");\nif(!operaVer){\n exit(0);\n}\n\n## Grep for Opera Versions prior to 11.10\nif(version_is_less(version:operaVer, test_version:\"11.10\")){\n security_message(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2020-04-26T15:08:29", "description": "The host is installed with Opera browser and is prone to multiple\n vulnerabilities.", "cvss3": {}, "published": "2012-04-19T00:00:00", "type": "openvas", "title": "Opera Browser Multiple Vulnerabilities-02 July-11 (Mac OS X)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-2640", "CVE-2011-2634", "CVE-2011-2639", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2638", "CVE-2011-2637"], "modified": "2020-04-22T00:00:00", "id": "OPENVAS:1361412562310802756", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310802756", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Opera Browser Multiple Vulnerabilities-02 July-11 (Mac OS X)\n#\n# Authors:\n# Madhuri D <dmadhuri@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.802756\");\n script_version(\"2020-04-22T10:27:30+0000\");\n script_cve_id(\"CVE-2011-2635\", \"CVE-2011-2634\", \"CVE-2011-2636\", \"CVE-2011-2637\",\n \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-22 10:27:30 +0000 (Wed, 22 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-04-19 11:33:54 +0530 (Thu, 19 Apr 2012)\");\n script_name(\"Opera Browser Multiple Vulnerabilities-02 July-11 (Mac OS X)\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/68452\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/docs/changelogs/mac/1110/\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_opera_detect_macosx.nasl\");\n script_mandatory_keys(\"Opera/MacOSX/Version\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to execute arbitrary code\n and cause a denial of service.\");\n script_tag(name:\"affected\", value:\"Opera Web Browser version prior 11.10 on Mac OS X\");\n script_tag(name:\"insight\", value:\"The flaws are due to\n\n - An error in cascading Style Sheets (CSS) implementation, allows attackers\n to cause denial of service via vectors involving use of the hover pseudo\n class.\n\n - A Hijacking searches and other customisations in Opera.\n\n - An error Tomato Firmware v1.28.1816 Status Device List page in Opera.\n\n - Crashes on futura-sciences.com, seoptimise.com, mitosyfraudes.org.\n\n - Crash occurring with games on zylom.com.\n\n - A Hidden animated '.gif' causing high CPU load, because of constant repaints.\n\n - A crash when passing empty parameter to a Java applet.\");\n script_tag(name:\"solution\", value:\"Upgrade to Opera Web Browser version 11.10 or later.\");\n script_tag(name:\"summary\", value:\"The host is installed with Opera browser and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"http://www.opera.com/download/\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\noperaVer = get_kb_item(\"Opera/MacOSX/Version\");\nif(!operaVer){\n exit(0);\n}\n\nif(version_is_less(version:operaVer, test_version:\"11.10\")){\n report = report_fixed_ver(installed_version:operaVer, fixed_version:\"11.10\");\n security_message(port:0, data:report);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:38:57", "description": "The remote host is missing updates announced in\nadvisory GLSA 201206-03.", "cvss3": {}, "published": "2012-08-10T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201206-03 (Opera)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-2626", "CVE-2011-2623", "CVE-2011-0685", "CVE-2012-3557", "CVE-2011-0684", "CVE-2009-4071", "CVE-2009-1234", "CVE-2012-1924", "CVE-2012-3556", "CVE-2011-2618", "CVE-2011-2640", "CVE-2011-3388", "CVE-2011-2621", "CVE-2010-2421", "CVE-2011-4681", "CVE-2010-4579", "CVE-2011-2619", "CVE-2012-1925", "CVE-2011-2609", "CVE-2010-4585", "CVE-2010-0653", "CVE-2011-2630", "CVE-2011-2625", "CVE-2010-2662", "CVE-2010-2659", "CVE-2012-1927", "CVE-2010-2121", "CVE-2011-2613", "CVE-2010-4583", "CVE-2011-2614", "CVE-2012-1928", "CVE-2011-2634", "CVE-2010-3021", "CVE-2010-3020", "CVE-2010-2455", "CVE-2009-2059", "CVE-2010-2576", "CVE-2012-1930", "CVE-2011-2639", "CVE-2012-1926", "CVE-2010-2663", "CVE-2009-3049", "CVE-2011-2620", "CVE-2009-3046", "CVE-2010-2665", "CVE-2011-2611", "CVE-2012-3555", "CVE-2011-2622", "CVE-2010-4581", "CVE-2009-3044", "CVE-2010-4582", "CVE-2009-3013", "CVE-2011-4682", "CVE-2011-2632", "CVE-2011-2617", "CVE-2011-4065", "CVE-2009-3047", "CVE-2010-3019", "CVE-2011-2635", "CVE-2011-2616", "CVE-2011-2615", "CVE-2010-2661", "CVE-2011-0682", "CVE-2010-4586", "CVE-2011-1824", "CVE-2009-2070", "CVE-2009-3831", "CVE-2009-3045", "CVE-2011-0687", "CVE-2012-3561", "CVE-2012-3558", "CVE-2009-4072", "CVE-2009-3048", "CVE-2011-2627", "CVE-2011-2610", "CVE-2010-1993", "CVE-2010-2664", "CVE-2011-0686", "CVE-2011-1337", "CVE-2011-2631", "CVE-2011-2629", "CVE-2011-4683", "CVE-2011-0683", "CVE-2011-2628", "CVE-2010-4584", "CVE-2009-2063", "CVE-2011-2612", "CVE-2010-2660", "CVE-2010-1349", "CVE-2009-2067", "CVE-2011-2636", "CVE-2011-2641", "CVE-2011-2638", "CVE-2010-2658", "CVE-2010-4580", "CVE-2012-3560", "CVE-2011-2637", "CVE-2011-0681", "CVE-2012-1931", "CVE-2011-2624", "CVE-2010-1989", "CVE-2011-2633"], "modified": "2018-10-12T00:00:00", "id": "OPENVAS:136141256231071547", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231071547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa_201206_03.nasl 11859 2018-10-12 08:53:01Z cfischer $\n#\n# Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.71547\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-1234\", \"CVE-2009-2059\", \"CVE-2009-2063\", \"CVE-2009-2067\", \"CVE-2009-2070\", \"CVE-2009-3013\", \"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\", \"CVE-2009-3047\", \"CVE-2009-3048\", \"CVE-2009-3049\", \"CVE-2009-3831\", \"CVE-2009-4071\", \"CVE-2009-4072\", \"CVE-2010-0653\", \"CVE-2010-1349\", \"CVE-2010-1989\", \"CVE-2010-1993\", \"CVE-2010-2121\", \"CVE-2010-2421\", \"CVE-2010-2455\", \"CVE-2010-2576\", \"CVE-2010-2658\", \"CVE-2010-2659\", \"CVE-2010-2660\", \"CVE-2010-2661\", \"CVE-2010-2662\", \"CVE-2010-2663\", \"CVE-2010-2664\", \"CVE-2010-2665\", \"CVE-2010-3019\", \"CVE-2010-3020\", \"CVE-2010-3021\", \"CVE-2010-4579\", \"CVE-2010-4580\", \"CVE-2010-4581\", \"CVE-2010-4582\", \"CVE-2010-4583\", \"CVE-2010-4584\", \"CVE-2010-4585\", \"CVE-2010-4586\", \"CVE-2011-0681\", \"CVE-2011-0682\", \"CVE-2011-0683\", \"CVE-2011-0684\", \"CVE-2011-0685\", \"CVE-2011-0686\", \"CVE-2011-0687\", \"CVE-2011-1337\", \"CVE-2011-1824\", \"CVE-2011-2609\", \"CVE-2011-2610\", \"CVE-2011-2611\", \"CVE-2011-2612\", \"CVE-2011-2613\", \"CVE-2011-2614\", \"CVE-2011-2615\", \"CVE-2011-2616\", \"CVE-2011-2617\", \"CVE-2011-2618\", \"CVE-2011-2619\", \"CVE-2011-2620\", \"CVE-2011-2621\", \"CVE-2011-2622\", \"CVE-2011-2623\", \"CVE-2011-2624\", \"CVE-2011-2625\", \"CVE-2011-2626\", \"CVE-2011-2627\", \"CVE-2011-2628\", \"CVE-2011-2629\", \"CVE-2011-2630\", \"CVE-2011-2631\", \"CVE-2011-2632\", \"CVE-2011-2633\", \"CVE-2011-2634\", \"CVE-2011-2635\", \"CVE-2011-2636\", \"CVE-2011-2637\", \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\", \"CVE-2011-2641\", \"CVE-2011-3388\", \"CVE-2011-4065\", \"CVE-2011-4681\", \"CVE-2011-4682\", \"CVE-2011-4683\", \"CVE-2012-1924\", \"CVE-2012-1925\", \"CVE-2012-1926\", \"CVE-2012-1927\", \"CVE-2012-1928\", \"CVE-2012-1930\", \"CVE-2012-1931\", \"CVE-2012-3555\", \"CVE-2012-3556\", \"CVE-2012-3557\", \"CVE-2012-3558\", \"CVE-2012-3560\", \"CVE-2012-3561\");\n script_version(\"$Revision: 11859 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 10:53:01 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-10 03:22:53 -0400 (Fri, 10 Aug 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201206-03 (Opera)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been found in Opera, the worst of\n which allow for the execution of arbitrary code.\");\n script_tag(name:\"solution\", value:\"All Opera users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/opera-12.00.1467'\");\n\n script_xref(name:\"URL\", value:\"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201206-03\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=264831\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=283391\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=290862\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=293902\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=294208\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=294680\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=308069\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=324189\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=325199\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=326413\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=332449\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=348874\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=352750\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=367837\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=373289\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=381275\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=386217\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=387137\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=393395\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=409857\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=415379\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=421075\");\n script_tag(name:\"summary\", value:\"The remote host is missing updates announced in\nadvisory GLSA 201206-03.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-gentoo.inc\");\ninclude(\"revisions-lib.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"www-client/opera\", unaffected: make_list(\"ge 12.00.1467\"), vulnerable: make_list(\"lt 12.00.1467\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-24T12:50:36", "description": "The remote host is missing updates announced in\nadvisory GLSA 201206-03.", "cvss3": {}, "published": "2012-08-10T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201206-03 (Opera)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-2626", "CVE-2011-2623", "CVE-2011-0685", "CVE-2012-3557", "CVE-2011-0684", "CVE-2009-4071", "CVE-2009-1234", "CVE-2012-1924", "CVE-2012-3556", "CVE-2011-2618", "CVE-2011-2640", "CVE-2011-3388", "CVE-2011-2621", "CVE-2010-2421", "CVE-2011-4681", "CVE-2010-4579", "CVE-2011-2619", "CVE-2012-1925", "CVE-2011-2609", "CVE-2010-4585", "CVE-2010-0653", "CVE-2011-2630", "CVE-2011-2625", "CVE-2010-2662", "CVE-2010-2659", "CVE-2012-1927", "CVE-2010-2121", "CVE-2011-2613", "CVE-2010-4583", "CVE-2011-2614", "CVE-2012-1928", "CVE-2011-2634", "CVE-2010-3021", "CVE-2010-3020", "CVE-2010-2455", "CVE-2009-2059", "CVE-2010-2576", "CVE-2012-1930", "CVE-2011-2639", "CVE-2012-1926", "CVE-2010-2663", "CVE-2009-3049", "CVE-2011-2620", "CVE-2009-3046", "CVE-2010-2665", "CVE-2011-2611", "CVE-2012-3555", "CVE-2011-2622", "CVE-2010-4581", "CVE-2009-3044", "CVE-2010-4582", "CVE-2009-3013", "CVE-2011-4682", "CVE-2011-2632", "CVE-2011-2617", "CVE-2011-4065", "CVE-2009-3047", "CVE-2010-3019", "CVE-2011-2635", "CVE-2011-2616", "CVE-2011-2615", "CVE-2010-2661", "CVE-2011-0682", "CVE-2010-4586", "CVE-2011-1824", "CVE-2009-2070", "CVE-2009-3831", "CVE-2009-3045", "CVE-2011-0687", "CVE-2012-3561", "CVE-2012-3558", "CVE-2009-4072", "CVE-2009-3048", "CVE-2011-2627", "CVE-2011-2610", "CVE-2010-1993", "CVE-2010-2664", "CVE-2011-0686", "CVE-2011-1337", "CVE-2011-2631", "CVE-2011-2629", "CVE-2011-4683", "CVE-2011-0683", "CVE-2011-2628", "CVE-2010-4584", "CVE-2009-2063", "CVE-2011-2612", "CVE-2010-2660", "CVE-2010-1349", "CVE-2009-2067", "CVE-2011-2636", "CVE-2011-2641", "CVE-2011-2638", "CVE-2010-2658", "CVE-2010-4580", "CVE-2012-3560", "CVE-2011-2637", "CVE-2011-0681", "CVE-2012-1931", "CVE-2011-2624", "CVE-2010-1989", "CVE-2011-2633"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:71547", "href": "http://plugins.openvas.org/nasl.php?oid=71547", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities have been found in Opera, the worst of\n which allow for the execution of arbitrary code.\";\ntag_solution = \"All Opera users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=www-client/opera-12.00.1467'\n \n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20201206-03\nhttp://bugs.gentoo.org/show_bug.cgi?id=264831\nhttp://bugs.gentoo.org/show_bug.cgi?id=283391\nhttp://bugs.gentoo.org/show_bug.cgi?id=290862\nhttp://bugs.gentoo.org/show_bug.cgi?id=293902\nhttp://bugs.gentoo.org/show_bug.cgi?id=294208\nhttp://bugs.gentoo.org/show_bug.cgi?id=294680\nhttp://bugs.gentoo.org/show_bug.cgi?id=308069\nhttp://bugs.gentoo.org/show_bug.cgi?id=324189\nhttp://bugs.gentoo.org/show_bug.cgi?id=325199\nhttp://bugs.gentoo.org/show_bug.cgi?id=326413\nhttp://bugs.gentoo.org/show_bug.cgi?id=332449\nhttp://bugs.gentoo.org/show_bug.cgi?id=348874\nhttp://bugs.gentoo.org/show_bug.cgi?id=352750\nhttp://bugs.gentoo.org/show_bug.cgi?id=367837\nhttp://bugs.gentoo.org/show_bug.cgi?id=373289\nhttp://bugs.gentoo.org/show_bug.cgi?id=381275\nhttp://bugs.gentoo.org/show_bug.cgi?id=386217\nhttp://bugs.gentoo.org/show_bug.cgi?id=387137\nhttp://bugs.gentoo.org/show_bug.cgi?id=393395\nhttp://bugs.gentoo.org/show_bug.cgi?id=409857\nhttp://bugs.gentoo.org/show_bug.cgi?id=415379\nhttp://bugs.gentoo.org/show_bug.cgi?id=421075\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 201206-03.\";\n\n \n \nif(description)\n{\n script_id(71547);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-1234\", \"CVE-2009-2059\", \"CVE-2009-2063\", \"CVE-2009-2067\", \"CVE-2009-2070\", \"CVE-2009-3013\", \"CVE-2009-3044\", \"CVE-2009-3045\", \"CVE-2009-3046\", \"CVE-2009-3047\", \"CVE-2009-3048\", \"CVE-2009-3049\", \"CVE-2009-3831\", \"CVE-2009-4071\", \"CVE-2009-4072\", \"CVE-2010-0653\", \"CVE-2010-1349\", \"CVE-2010-1989\", \"CVE-2010-1993\", \"CVE-2010-2121\", \"CVE-2010-2421\", \"CVE-2010-2455\", \"CVE-2010-2576\", \"CVE-2010-2658\", \"CVE-2010-2659\", \"CVE-2010-2660\", \"CVE-2010-2661\", \"CVE-2010-2662\", \"CVE-2010-2663\", \"CVE-2010-2664\", \"CVE-2010-2665\", \"CVE-2010-3019\", \"CVE-2010-3020\", \"CVE-2010-3021\", \"CVE-2010-4579\", \"CVE-2010-4580\", \"CVE-2010-4581\", \"CVE-2010-4582\", \"CVE-2010-4583\", \"CVE-2010-4584\", \"CVE-2010-4585\", \"CVE-2010-4586\", \"CVE-2011-0681\", \"CVE-2011-0682\", \"CVE-2011-0683\", \"CVE-2011-0684\", \"CVE-2011-0685\", \"CVE-2011-0686\", \"CVE-2011-0687\", \"CVE-2011-1337\", \"CVE-2011-1824\", \"CVE-2011-2609\", \"CVE-2011-2610\", \"CVE-2011-2611\", \"CVE-2011-2612\", \"CVE-2011-2613\", \"CVE-2011-2614\", \"CVE-2011-2615\", \"CVE-2011-2616\", \"CVE-2011-2617\", \"CVE-2011-2618\", \"CVE-2011-2619\", \"CVE-2011-2620\", \"CVE-2011-2621\", \"CVE-2011-2622\", \"CVE-2011-2623\", \"CVE-2011-2624\", \"CVE-2011-2625\", \"CVE-2011-2626\", \"CVE-2011-2627\", \"CVE-2011-2628\", \"CVE-2011-2629\", \"CVE-2011-2630\", \"CVE-2011-2631\", \"CVE-2011-2632\", \"CVE-2011-2633\", \"CVE-2011-2634\", \"CVE-2011-2635\", \"CVE-2011-2636\", \"CVE-2011-2637\", \"CVE-2011-2638\", \"CVE-2011-2639\", \"CVE-2011-2640\", \"CVE-2011-2641\", \"CVE-2011-3388\", \"CVE-2011-4065\", \"CVE-2011-4681\", \"CVE-2011-4682\", \"CVE-2011-4683\", \"CVE-2012-1924\", \"CVE-2012-1925\", \"CVE-2012-1926\", \"CVE-2012-1927\", \"CVE-2012-1928\", \"CVE-2012-1930\", \"CVE-2012-1931\", \"CVE-2012-3555\", \"CVE-2012-3556\", \"CVE-2012-3557\", \"CVE-2012-3558\", \"CVE-2012-3560\", \"CVE-2012-3561\");\n script_version(\"$Revision: 6589 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 10:27:50 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-10 03:22:53 -0400 (Fri, 10 Aug 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201206-03 (Opera)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"www-client/opera\", unaffected: make_list(\"ge 12.00.1467\"), vulnerable: make_list(\"lt 12.00.1467\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cve": [{"lastseen": "2022-03-23T12:13:26", "description": "The Cascading Style Sheets (CSS) implementation in Opera before 11.10 allows remote attackers to cause a denial of service (application crash) via vectors involving use of the :hover pseudo-class, in conjunction with transforms, for a floated element.", "cvss3": {}, "published": "2011-07-01T10:55:00", "type": "cve", "title": "CVE-2011-2635", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2635"], "modified": "2011-07-06T04:00:00", "cpe": ["cpe:/a:opera:opera_browser:6.04", "cpe:/a:opera:opera_browser:9.62", "cpe:/a:opera:opera_browser:11.10", "cpe:/a:opera:opera_browser:9.51", "cpe:/a:opera:opera_browser:7.21", "cpe:/a:opera:opera_browser:6.02", "cpe:/a:opera:opera_browser:6.03", "cpe:/a:opera:opera_browser:9.20", "cpe:/a:opera:opera_browser:8.50", "cpe:/a:opera:opera_browser:9.24", "cpe:/a:opera:opera_browser:9.0", "cpe:/a:opera:opera_browser:9.27", "cpe:/a:opera:opera_browser:10.53", "cpe:/a:opera:opera_browser:7.52", "cpe:/a:opera:opera_browser:8.52", "cpe:/a:opera:opera_browser:9.10", "cpe:/a:opera:opera_browser:6.1", "cpe:/a:opera:opera_browser:9.21", "cpe:/a:opera:opera_browser:8.01", "cpe:/a:opera:opera_browser:7.0", "cpe:/a:opera:opera_browser:9.26", "cpe:/a:opera:opera_browser:7.51", "cpe:/a:opera:opera_browser:7.54", "cpe:/a:opera:opera_browser:5.12", "cpe:/a:opera:opera_browser:5.11", "cpe:/a:opera:opera_browser:10.10", "cpe:/a:opera:opera_browser:6.12", "cpe:/a:opera:opera_browser:9.52", "cpe:/a:opera:opera_browser:7.20", "cpe:/a:opera:opera_browser:10.51", "cpe:/a:opera:opera_browser:10.61", "cpe:/a:opera:opera_browser:10.63", "cpe:/a:opera:opera_browser:5.0", "cpe:/a:opera:opera_browser:9.22", "cpe:/a:opera:opera_browser:6.11", "cpe:/a:opera:opera_browser:9.12", "cpe:/a:opera:opera_browser:6.01", "cpe:/a:opera:opera_browser:11.00", "cpe:/a:opera:opera_browser:5.02", "cpe:/a:opera:opera_browser:9.50", "cpe:/a:opera:opera_browser:8.54", "cpe:/a:opera:opera_browser:7.01", "cpe:/a:opera:opera_browser:7.02", "cpe:/a:opera:opera_browser:6.0", "cpe:/a:opera:opera_browser:7.50", "cpe:/a:opera:opera_browser:6.06", "cpe:/a:opera:opera_browser:6.05", "cpe:/a:opera:opera_browser:5.10", "cpe:/a:opera:opera_browser:11.01", "cpe:/a:opera:opera_browser:10.00", "cpe:/a:opera:opera_browser:7.11", "cpe:/a:opera:opera_browser:10.01", "cpe:/a:opera:opera_browser:10.60", "cpe:/a:opera:opera_browser:10.54", "cpe:/a:opera:opera_browser:7.10", "cpe:/a:opera:opera_browser:9.64", "cpe:/a:opera:opera_browser:10.52", "cpe:/a:opera:opera_browser:9.01", "cpe:/a:opera:opera_browser:9.60", "cpe:/a:opera:opera_browser:7.03", "cpe:/a:opera:opera_browser:7.23", "cpe:/a:opera:opera_browser:9.61", "cpe:/a:opera:opera_browser:9.02", "cpe:/a:opera:opera_browser:8.0", "cpe:/a:opera:opera_browser:8.02", "cpe:/a:opera:opera_browser:9.23", "cpe:/a:opera:opera_browser:9.63", "cpe:/a:opera:opera_browser:7.60", "cpe:/a:opera:opera_browser:10.62", "cpe:/a:opera:opera_browser:7.22", "cpe:/a:opera:opera_browser:8.51", "cpe:/a:opera:opera_browser:9.25", "cpe:/a:opera:opera_browser:7.53", "cpe:/a:opera:opera_browser:10.50", "cpe:/a:opera:opera_browser:8.53"], "id": "CVE-2011-2635", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2635", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:13:29", "description": "Unspecified vulnerability in Opera before 11.10 allows remote attackers to cause a denial of service (application crash) via unknown content on a web page, as demonstrated by games on zylom.com.", "cvss3": {}, "published": "2011-07-01T10:55:00", "type": "cve", "title": "CVE-2011-2638", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2638"], "modified": "2011-07-06T04:00:00", "cpe": ["cpe:/a:opera:opera_browser:6.04", "cpe:/a:opera:opera_browser:9.62", "cpe:/a:opera:opera_browser:9.51", "cpe:/a:opera:opera_browser:11.10", "cpe:/a:opera:opera_browser:7.21", "cpe:/a:opera:opera_browser:6.02", "cpe:/a:opera:opera_browser:6.03", "cpe:/a:opera:opera_browser:9.20", "cpe:/a:opera:opera_browser:9.24", "cpe:/a:opera:opera_browser:8.50", "cpe:/a:opera:opera_browser:10.53", "cpe:/a:opera:opera_browser:9.27", "cpe:/a:opera:opera_browser:9.0", "cpe:/a:opera:opera_browser:9.10", "cpe:/a:opera:opera_browser:7.52", "cpe:/a:opera:opera_browser:8.52", "cpe:/a:opera:opera_browser:6.1", "cpe:/a:opera:opera_browser:9.21", "cpe:/a:opera:opera_browser:8.01", "cpe:/a:opera:opera_browser:7.0", "cpe:/a:opera:opera_browser:9.26", "cpe:/a:opera:opera_browser:7.51", "cpe:/a:opera:opera_browser:7.54", "cpe:/a:opera:opera_browser:5.12", "cpe:/a:opera:opera_browser:10.10", "cpe:/a:opera:opera_browser:6.12", "cpe:/a:opera:opera_browser:7.20", "cpe:/a:opera:opera_browser:9.52", "cpe:/a:opera:opera_browser:10.51", "cpe:/a:opera:opera_browser:9.12", "cpe:/a:opera:opera_browser:9.22", "cpe:/a:opera:opera_browser:5.0", "cpe:/a:opera:opera_browser:6.11", "cpe:/a:opera:opera_browser:10.61", "cpe:/a:opera:opera_browser:10.63", "cpe:/a:opera:opera_browser:6.01", "cpe:/a:opera:opera_browser:11.00", "cpe:/a:opera:opera_browser:5.02", "cpe:/a:opera:opera_browser:7.01", "cpe:/a:opera:opera_browser:7.02", "cpe:/a:opera:opera_browser:9.50", "cpe:/a:opera:opera_browser:8.54", "cpe:/a:opera:opera_browser:6.0", "cpe:/a:opera:opera_browser:6.06", "cpe:/a:opera:opera_browser:7.50", "cpe:/a:opera:opera_browser:6.05", "cpe:/a:opera:opera_browser:5.10", "cpe:/a:opera:opera_browser:11.01", "cpe:/a:opera:opera_browser:10.00", "cpe:/a:opera:opera_browser:7.11", "cpe:/a:opera:opera_browser:10.01", "cpe:/a:opera:opera_browser:10.54", "cpe:/a:opera:opera_browser:10.60", "cpe:/a:opera:opera_browser:9.64", "cpe:/a:opera:opera_browser:7.10", "cpe:/a:opera:opera_browser:10.52", "cpe:/a:opera:opera_browser:9.01", "cpe:/a:opera:opera_browser:9.60", "cpe:/a:opera:opera_browser:7.03", "cpe:/a:opera:opera_browser:9.02", "cpe:/a:opera:opera_browser:9.61", "cpe:/a:opera:opera_browser:7.23", "cpe:/a:opera:opera_browser:8.0", "cpe:/a:opera:opera_browser:8.02", "cpe:/a:opera:opera_browser:9.23", "cpe:/a:opera:opera_browser:9.63", "cpe:/a:opera:opera_browser:7.60", "cpe:/a:opera:opera_browser:10.62", "cpe:/a:opera:opera_browser:7.22", "cpe:/a:opera:opera_browser:8.51", "cpe:/a:opera:opera_browser:9.25", "cpe:/a:opera:opera_browser:7.53", "cpe:/a:opera:opera_browser:8.53", "cpe:/a:opera:opera_browser:10.50", "cpe:/a:opera:opera_browser:5.11"], "id": "CVE-2011-2638", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2638", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:13:30", "description": "Opera before 11.10 does not properly handle hidden animated GIF images, which allows remote attackers to cause a denial of service (CPU consumption) via an image file that triggers continual repaints.", "cvss3": {}, "published": "2011-07-01T10:55:00", "type": "cve", "title": "CVE-2011-2639", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2639"], "modified": "2011-07-05T04:00:00", "cpe": ["cpe:/a:opera:opera_browser:6.04", "cpe:/a:opera:opera_browser:9.62", "cpe:/a:opera:opera_browser:11.10", "cpe:/a:opera:opera_browser:9.51", "cpe:/a:opera:opera_browser:7.21", "cpe:/a:opera:opera_browser:6.02", "cpe:/a:opera:opera_browser:6.03", "cpe:/a:opera:opera_browser:9.20", "cpe:/a:opera:opera_browser:9.24", "cpe:/a:opera:opera_browser:8.50", "cpe:/a:opera:opera_browser:9.0", "cpe:/a:opera:opera_browser:7.52", "cpe:/a:opera:opera_browser:10.53", "cpe:/a:opera:opera_browser:9.10", "cpe:/a:opera:opera_browser:6.1", "cpe:/a:opera:opera_browser:8.52", "cpe:/a:opera:opera_browser:9.27", "cpe:/a:opera:opera_browser:8.01", "cpe:/a:opera:opera_browser:9.21", "cpe:/a:opera:opera_browser:7.0", "cpe:/a:opera:opera_browser:9.26", "cpe:/a:opera:opera_browser:7.51", "cpe:/a:opera:opera_browser:7.54", "cpe:/a:opera:opera_browser:5.12", "cpe:/a:opera:opera_browser:10.10", "cpe:/a:opera:opera_browser:6.12", "cpe:/a:opera:opera_browser:7.20", "cpe:/a:opera:opera_browser:9.52", "cpe:/a:opera:opera_browser:10.51", "cpe:/a:opera:opera_browser:9.12", "cpe:/a:opera:opera_browser:10.61", "cpe:/a:opera:opera_browser:5.0", "cpe:/a:opera:opera_browser:10.63", "cpe:/a:opera:opera_browser:9.22", "cpe:/a:opera:opera_browser:6.11", "cpe:/a:opera:opera_browser:6.01", "cpe:/a:opera:opera_browser:11.00", "cpe:/a:opera:opera_browser:5.02", "cpe:/a:opera:opera_browser:9.50", "cpe:/a:opera:opera_browser:8.54", "cpe:/a:opera:opera_browser:7.01", "cpe:/a:opera:opera_browser:7.02", "cpe:/a:opera:opera_browser:6.0", "cpe:/a:opera:opera_browser:7.50", "cpe:/a:opera:opera_browser:6.06", "cpe:/a:opera:opera_browser:6.05", "cpe:/a:opera:opera_browser:5.10", "cpe:/a:opera:opera_browser:11.01", "cpe:/a:opera:opera_browser:10.00", "cpe:/a:opera:opera_browser:7.11", "cpe:/a:opera:opera_browser:10.01", "cpe:/a:opera:opera_browser:10.60", "cpe:/a:opera:opera_browser:10.54", "cpe:/a:opera:opera_browser:7.10", "cpe:/a:opera:opera_browser:9.64", "cpe:/a:opera:opera_browser:10.52", "cpe:/a:opera:opera_browser:9.01", "cpe:/a:opera:opera_browser:9.60", "cpe:/a:opera:opera_browser:9.61", "cpe:/a:opera:opera_browser:7.23", "cpe:/a:opera:opera_browser:7.03", "cpe:/a:opera:opera_browser:9.02", "cpe:/a:opera:opera_browser:8.0", "cpe:/a:opera:opera_browser:9.23", "cpe:/a:opera:opera_browser:8.02", "cpe:/a:opera:opera_browser:9.63", "cpe:/a:opera:opera_browser:7.60", "cpe:/a:opera:opera_browser:10.62", "cpe:/a:opera:opera_browser:7.22", "cpe:/a:opera:opera_browser:8.51", "cpe:/a:opera:opera_browser:9.25", "cpe:/a:opera:opera_browser:7.53", "cpe:/a:opera:opera_browser:8.53", "cpe:/a:opera:opera_browser:10.50", "cpe:/a:opera:opera_browser:5.11"], "id": "CVE-2011-2639", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2639", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:13:27", "description": "Unspecified vulnerability in Opera before 11.10 allows remote attackers to cause a denial of service (application crash) via unknown content on a web page, as demonstrated by a certain Tomato Firmware page.", "cvss3": {}, "published": "2011-07-01T10:55:00", "type": "cve", "title": "CVE-2011-2636", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2636"], "modified": "2011-07-06T04:00:00", "cpe": ["cpe:/a:opera:opera_browser:6.04", "cpe:/a:opera:opera_browser:9.51", "cpe:/a:opera:opera_browser:9.62", "cpe:/a:opera:opera_browser:11.10", "cpe:/a:opera:opera_browser:7.21", "cpe:/a:opera:opera_browser:6.02", "cpe:/a:opera:opera_browser:6.03", "cpe:/a:opera:opera_browser:9.20", "cpe:/a:opera:opera_browser:8.50", "cpe:/a:opera:opera_browser:9.24", "cpe:/a:opera:opera_browser:9.0", "cpe:/a:opera:opera_browser:10.53", "cpe:/a:opera:opera_browser:7.52", "cpe:/a:opera:opera_browser:9.27", "cpe:/a:opera:opera_browser:8.52", "cpe:/a:opera:opera_browser:9.10", "cpe:/a:opera:opera_browser:6.1", "cpe:/a:opera:opera_browser:9.21", "cpe:/a:opera:opera_browser:8.01", "cpe:/a:opera:opera_browser:7.0", "cpe:/a:opera:opera_browser:9.26", "cpe:/a:opera:opera_browser:7.51", "cpe:/a:opera:opera_browser:7.54", "cpe:/a:opera:opera_browser:5.12", "cpe:/a:opera:opera_browser:5.11", "cpe:/a:opera:opera_browser:10.10", "cpe:/a:opera:opera_browser:6.12", "cpe:/a:opera:opera_browser:9.52", "cpe:/a:opera:opera_browser:7.20", "cpe:/a:opera:opera_browser:10.51", "cpe:/a:opera:opera_browser:10.61", "cpe:/a:opera:opera_browser:10.63", "cpe:/a:opera:opera_browser:5.0", "cpe:/a:opera:opera_browser:9.22", "cpe:/a:opera:opera_browser:6.11", "cpe:/a:opera:opera_browser:9.12", "cpe:/a:opera:opera_browser:6.01", "cpe:/a:opera:opera_browser:11.00", "cpe:/a:opera:opera_browser:5.02", "cpe:/a:opera:opera_browser:9.50", "cpe:/a:opera:opera_browser:8.54", "cpe:/a:opera:opera_browser:7.02", "cpe:/a:opera:opera_browser:7.01", "cpe:/a:opera:opera_browser:6.0", "cpe:/a:opera:opera_browser:7.50", "cpe:/a:opera:opera_browser:6.06", "cpe:/a:opera:opera_browser:6.05", "cpe:/a:opera:opera_browser:5.10", "cpe:/a:opera:opera_browser:11.01", "cpe:/a:opera:opera_browser:10.00", "cpe:/a:opera:opera_browser:7.11", "cpe:/a:opera:opera_browser:10.01", "cpe:/a:opera:opera_browser:10.60", "cpe:/a:opera:opera_browser:10.54", "cpe:/a:opera:opera_browser:7.10", "cpe:/a:opera:opera_browser:9.64", "cpe:/a:opera:opera_browser:10.52", "cpe:/a:opera:opera_browser:9.01", "cpe:/a:opera:opera_browser:7.03", "cpe:/a:opera:opera_browser:9.60", "cpe:/a:opera:opera_browser:7.23", "cpe:/a:opera:opera_browser:9.61", "cpe:/a:opera:opera_browser:9.02", "cpe:/a:opera:opera_browser:8.0", "cpe:/a:opera:opera_browser:8.02", "cpe:/a:opera:opera_browser:9.23", "cpe:/a:opera:opera_browser:9.63", "cpe:/a:opera:opera_browser:7.60", "cpe:/a:opera:opera_browser:10.62", "cpe:/a:opera:opera_browser:7.22", "cpe:/a:opera:opera_browser:8.51", "cpe:/a:opera:opera_browser:9.25", "cpe:/a:opera:opera_browser:7.53", "cpe:/a:opera:opera_browser:10.50", "cpe:/a:opera:opera_browser:8.53"], "id": "CVE-2011-2636", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2636", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:13:31", "description": "Opera before 11.10 allows remote attackers to cause a denial of service (application crash) via an HTML document that has an empty parameter value for an embedded Java applet.", "cvss3": {}, "published": "2011-07-01T10:55:00", "type": "cve", "title": "CVE-2011-2640", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2640"], "modified": "2017-08-29T01:29:00", "cpe": ["cpe:/a:opera:opera_browser:6.04", "cpe:/a:opera:opera_browser:9.51", "cpe:/a:opera:opera_browser:11.10", "cpe:/a:opera:opera_browser:9.62", "cpe:/a:opera:opera_browser:7.21", "cpe:/a:opera:opera_browser:6.02", "cpe:/a:opera:opera_browser:6.03", "cpe:/a:opera:opera_browser:9.20", "cpe:/a:opera:opera_browser:8.50", "cpe:/a:opera:opera_browser:9.24", "cpe:/a:opera:opera_browser:10.53", "cpe:/a:opera:opera_browser:7.52", "cpe:/a:opera:opera_browser:9.27", "cpe:/a:opera:opera_browser:9.0", "cpe:/a:opera:opera_browser:6.1", "cpe:/a:opera:opera_browser:9.10", "cpe:/a:opera:opera_browser:8.52", "cpe:/a:opera:opera_browser:9.21", "cpe:/a:opera:opera_browser:8.01", "cpe:/a:opera:opera_browser:7.0", "cpe:/a:opera:opera_browser:9.26", "cpe:/a:opera:opera_browser:7.51", "cpe:/a:opera:opera_browser:7.54", "cpe:/a:opera:opera_browser:5.12", "cpe:/a:opera:opera_browser:5.11", "cpe:/a:opera:opera_browser:10.10", "cpe:/a:opera:opera_browser:6.12", "cpe:/a:opera:opera_browser:9.52", "cpe:/a:opera:opera_browser:7.20", "cpe:/a:opera:opera_browser:10.51", "cpe:/a:opera:opera_browser:10.61", "cpe:/a:opera:opera_browser:9.12", "cpe:/a:opera:opera_browser:5.0", "cpe:/a:opera:opera_browser:6.11", "cpe:/a:opera:opera_browser:10.63", "cpe:/a:opera:opera_browser:9.22", "cpe:/a:opera:opera_browser:6.01", "cpe:/a:opera:opera_browser:11.00", "cpe:/a:opera:opera_browser:5.02", "cpe:/a:opera:opera_browser:9.50", "cpe:/a:opera:opera_browser:7.01", "cpe:/a:opera:opera_browser:8.54", "cpe:/a:opera:opera_browser:7.02", "cpe:/a:opera:opera_browser:6.0", "cpe:/a:opera:opera_browser:6.06", "cpe:/a:opera:opera_browser:7.50", "cpe:/a:opera:opera_browser:6.05", "cpe:/a:opera:opera_browser:5.10", "cpe:/a:opera:opera_browser:11.01", "cpe:/a:opera:opera_browser:10.00", "cpe:/a:opera:opera_browser:7.11", "cpe:/a:opera:opera_browser:10.01", "cpe:/a:opera:opera_browser:10.60", "cpe:/a:opera:opera_browser:10.54", "cpe:/a:opera:opera_browser:9.64", "cpe:/a:opera:opera_browser:7.10", "cpe:/a:opera:opera_browser:10.52", "cpe:/a:opera:opera_browser:9.01", "cpe:/a:opera:opera_browser:9.60", "cpe:/a:opera:opera_browser:9.61", "cpe:/a:opera:opera_browser:9.02", "cpe:/a:opera:opera_browser:7.23", "cpe:/a:opera:opera_browser:7.03", "cpe:/a:opera:opera_browser:8.0", "cpe:/a:opera:opera_browser:9.23", "cpe:/a:opera:opera_browser:8.02", "cpe:/a:opera:opera_browser:9.63", "cpe:/a:opera:opera_browser:7.60", "cpe:/a:opera:opera_browser:10.62", "cpe:/a:opera:opera_browser:7.22", "cpe:/a:opera:opera_browser:8.51", "cpe:/a:opera:opera_browser:9.25", "cpe:/a:opera:opera_browser:7.53", "cpe:/a:opera:opera_browser:10.50", "cpe:/a:opera:opera_browser:8.53"], "id": "CVE-2011-2640", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2640", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:13:28", "description": "Unspecified vulnerability in Opera before 11.10 allows remote attackers to cause a denial of service (application crash) via unknown content on a web page, as demonstrated by futura-sciences.com, seoptimise.com, and mitosyfraudes.org.", "cvss3": {}, "published": "2011-07-01T10:55:00", "type": "cve", "title": "CVE-2011-2637", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2637"], "modified": "2011-07-06T04:00:00", "cpe": ["cpe:/a:opera:opera_browser:6.04", "cpe:/a:opera:opera_browser:9.62", "cpe:/a:opera:opera_browser:9.51", "cpe:/a:opera:opera_browser:11.10", "cpe:/a:opera:opera_browser:7.21", "cpe:/a:opera:opera_browser:6.02", "cpe:/a:opera:opera_browser:6.03", "cpe:/a:opera:opera_browser:9.20", "cpe:/a:opera:opera_browser:9.24", "cpe:/a:opera:opera_browser:8.50", "cpe:/a:opera:opera_browser:9.0", "cpe:/a:opera:opera_browser:9.27", "cpe:/a:opera:opera_browser:10.53", "cpe:/a:opera:opera_browser:9.10", "cpe:/a:opera:opera_browser:8.52", "cpe:/a:opera:opera_browser:7.52", "cpe:/a:opera:opera_browser:6.1", "cpe:/a:opera:opera_browser:8.01", "cpe:/a:opera:opera_browser:9.21", "cpe:/a:opera:opera_browser:7.0", "cpe:/a:opera:opera_browser:9.26", "cpe:/a:opera:opera_browser:7.51", "cpe:/a:opera:opera_browser:7.54", "cpe:/a:opera:opera_browser:5.12", "cpe:/a:opera:opera_browser:10.10", "cpe:/a:opera:opera_browser:6.12", "cpe:/a:opera:opera_browser:7.20", "cpe:/a:opera:opera_browser:9.52", "cpe:/a:opera:opera_browser:10.51", "cpe:/a:opera:opera_browser:9.12", "cpe:/a:opera:opera_browser:10.63", "cpe:/a:opera:opera_browser:5.0", "cpe:/a:opera:opera_browser:9.22", "cpe:/a:opera:opera_browser:10.61", "cpe:/a:opera:opera_browser:6.11", "cpe:/a:opera:opera_browser:6.01", "cpe:/a:opera:opera_browser:11.00", "cpe:/a:opera:opera_browser:5.02", "cpe:/a:opera:opera_browser:7.01", "cpe:/a:opera:opera_browser:9.50", "cpe:/a:opera:opera_browser:8.54", "cpe:/a:opera:opera_browser:7.02", "cpe:/a:opera:opera_browser:6.0", "cpe:/a:opera:opera_browser:7.50", "cpe:/a:opera:opera_browser:6.06", "cpe:/a:opera:opera_browser:6.05", "cpe:/a:opera:opera_browser:5.10", "cpe:/a:opera:opera_browser:11.01", "cpe:/a:opera:opera_browser:10.00", "cpe:/a:opera:opera_browser:7.11", "cpe:/a:opera:opera_browser:10.01", "cpe:/a:opera:opera_browser:10.60", "cpe:/a:opera:opera_browser:10.54", "cpe:/a:opera:opera_browser:9.64", "cpe:/a:opera:opera_browser:7.10", "cpe:/a:opera:opera_browser:10.52", "cpe:/a:opera:opera_browser:9.01", "cpe:/a:opera:opera_browser:9.60", "cpe:/a:opera:opera_browser:9.61", "cpe:/a:opera:opera_browser:7.03", "cpe:/a:opera:opera_browser:7.23", "cpe:/a:opera:opera_browser:9.02", "cpe:/a:opera:opera_browser:8.0", "cpe:/a:opera:opera_browser:9.23", "cpe:/a:opera:opera_browser:8.02", "cpe:/a:opera:opera_browser:9.63", "cpe:/a:opera:opera_browser:7.60", "cpe:/a:opera:opera_browser:10.62", "cpe:/a:opera:opera_browser:7.22", "cpe:/a:opera:opera_browser:8.51", "cpe:/a:opera:opera_browser:9.25", "cpe:/a:opera:opera_browser:7.53", "cpe:/a:opera:opera_browser:8.53", "cpe:/a:opera:opera_browser:10.50", "cpe:/a:opera:opera_browser:5.11"], "id": "CVE-2011-2637", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2637", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:13:25", "description": "Opera before 11.10 allows remote attackers to hijack (1) searches and (2) customizations via unspecified third party applications.", "cvss3": {}, "published": "2011-07-01T10:55:00", "type": "cve", "title": "CVE-2011-2634", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-2634"], "modified": "2011-07-08T04:00:00", "cpe": ["cpe:/a:opera:opera_browser:6.04", "cpe:/a:opera:opera_browser:9.62", "cpe:/a:opera:opera_browser:11.10", "cpe:/a:opera:opera_browser:9.51", "cpe:/a:opera:opera_browser:7.21", "cpe:/a:opera:opera_browser:6.02", "cpe:/a:opera:opera_browser:6.03", "cpe:/a:opera:opera_browser:9.20", "cpe:/a:opera:opera_browser:9.24", "cpe:/a:opera:opera_browser:8.50", "cpe:/a:opera:opera_browser:9.0", "cpe:/a:opera:opera_browser:10.53", "cpe:/a:opera:opera_browser:9.27", "cpe:/a:opera:opera_browser:9.10", "cpe:/a:opera:opera_browser:6.1", "cpe:/a:opera:opera_browser:8.52", "cpe:/a:opera:opera_browser:7.52", "cpe:/a:opera:opera_browser:8.01", "cpe:/a:opera:opera_browser:9.21", "cpe:/a:opera:opera_browser:7.0", "cpe:/a:opera:opera_browser:9.26", "cpe:/a:opera:opera_browser:7.51", "cpe:/a:opera:opera_browser:7.54", "cpe:/a:opera:opera_browser:5.12", "cpe:/a:opera:opera_browser:10.10", "cpe:/a:opera:opera_browser:6.12", "cpe:/a:opera:opera_browser:7.20", "cpe:/a:opera:opera_browser:9.52", "cpe:/a:opera:opera_browser:10.51", "cpe:/a:opera:opera_browser:9.12", "cpe:/a:opera:opera_browser:10.61", "cpe:/a:opera:opera_browser:5.0", "cpe:/a:opera:opera_browser:10.63", "cpe:/a:opera:opera_browser:9.22", "cpe:/a:opera:opera_browser:6.11", "cpe:/a:opera:opera_browser:6.01", "cpe:/a:opera:opera_browser:11.00", "cpe:/a:opera:opera_browser:5.02", "cpe:/a:opera:opera_browser:7.01", "cpe:/a:opera:opera_browser:9.50", "cpe:/a:opera:opera_browser:8.54", "cpe:/a:opera:opera_browser:7.02", "cpe:/a:opera:opera_browser:6.0", "cpe:/a:opera:opera_browser:7.50", "cpe:/a:opera:opera_browser:6.06", "cpe:/a:opera:opera_browser:6.05", "cpe:/a:opera:opera_browser:5.10", "cpe:/a:opera:opera_browser:11.01", "cpe:/a:opera:opera_browser:10.00", "cpe:/a:opera:opera_browser:7.11", "cpe:/a:opera:opera_browser:10.01", "cpe:/a:opera:opera_browser:10.54", "cpe:/a:opera:opera_browser:10.60", "cpe:/a:opera:opera_browser:9.64", "cpe:/a:opera:opera_browser:7.10", "cpe:/a:opera:opera_browser:10.52", "cpe:/a:opera:opera_browser:9.01", "cpe:/a:opera:opera_browser:7.03", "cpe:/a:opera:opera_browser:9.61", "cpe:/a:opera:opera_browser:9.02", "cpe:/a:opera:opera_browser:9.60", "cpe:/a:opera:opera_browser:7.23", "cpe:/a:opera:opera_browser:8.0", "cpe:/a:opera:opera_browser:9.23", "cpe:/a:opera:opera_browser:8.02", "cpe:/a:opera:opera_browser:9.63", "cpe:/a:opera:opera_browser:7.60", "cpe:/a:opera:opera_browser:10.62", "cpe:/a:opera:opera_browser:7.22", "cpe:/a:opera:opera_browser:8.51", "cpe:/a:opera:opera_browser:9.25", "cpe:/a:opera:opera_browser:7.53", "cpe:/a:opera:opera_browser:8.53", "cpe:/a:opera:opera_browser:10.50", "cpe:/a:opera:opera_browser:5.11"], "id": "CVE-2011-2634", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2634", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.00:alpha:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*"]}], "gentoo": [{"lastseen": "2022-01-17T19:12:53", "description": "### Background\n\nOpera is a fast web browser that is available free of charge.\n\n### Description\n\nMultiple vulnerabilities have been discovered in Opera. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could entice a user to open a specially crafted web page, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. A remote attacker may be able to: trick users into downloading and executing arbitrary files, bypass intended access restrictions, spoof trusted content, spoof URLs, bypass the Same Origin Policy, obtain sensitive information, force subscriptions to arbitrary feeds, bypass the popup blocker, bypass CSS filtering, conduct cross-site scripting attacks, or have other unknown impact. \n\nA local attacker could perform symlink attacks to overwrite arbitrary files with the privileges of the user running the application or possibly obtain sensitive information. \n\nA physically proximate attacker may be able to access an email account. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Opera users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/opera-12.00.1467\"", "cvss3": {}, "published": "2012-06-15T00:00:00", "type": "gentoo", "title": "Opera: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-1234", "CVE-2009-2059", "CVE-2009-2063", "CVE-2009-2067", "CVE-2009-2070", "CVE-2009-3013", "CVE-2009-3044", "CVE-2009-3045", "CVE-2009-3046", "CVE-2009-3047", "CVE-2009-3048", "CVE-2009-3049", "CVE-2009-3831", "CVE-2009-4071", "CVE-2009-4072", "CVE-2010-0653", "CVE-2010-1349", "CVE-2010-1989", "CVE-2010-1993", "CVE-2010-2121", "CVE-2010-2421", "CVE-2010-2455", "CVE-2010-2576", "CVE-2010-2658", "CVE-2010-2659", "CVE-2010-2660", "CVE-2010-2661", "CVE-2010-2662", "CVE-2010-2663", "CVE-2010-2664", "CVE-2010-2665", "CVE-2010-3019", "CVE-2010-3020", "CVE-2010-3021", "CVE-2010-4579", "CVE-2010-4580", "CVE-2010-4581", "CVE-2010-4582", "CVE-2010-4583", "CVE-2010-4584", "CVE-2010-4585", "CVE-2010-4586", "CVE-2011-0681", "CVE-2011-0682", "CVE-2011-0683", "CVE-2011-0684", "CVE-2011-0685", "CVE-2011-0686", "CVE-2011-0687", "CVE-2011-1337", "CVE-2011-1824", "CVE-2011-2609", "CVE-2011-2610", "CVE-2011-2611", "CVE-2011-2612", "CVE-2011-2613", "CVE-2011-2614", "CVE-2011-2615", "CVE-2011-2616", "CVE-2011-2617", "CVE-2011-2618", "CVE-2011-2619", "CVE-2011-2620", "CVE-2011-2621", "CVE-2011-2622", "CVE-2011-2623", "CVE-2011-2624", "CVE-2011-2625", "CVE-2011-2626", "CVE-2011-2627", "CVE-2011-2628", "CVE-2011-2629", "CVE-2011-2630", "CVE-2011-2631", "CVE-2011-2632", "CVE-2011-2633", "CVE-2011-2634", "CVE-2011-2635", "CVE-2011-2636", "CVE-2011-2637", "CVE-2011-2638", "CVE-2011-2639", "CVE-2011-2640", "CVE-2011-2641", "CVE-2011-3388", "CVE-2011-4065", "CVE-2011-4681", "CVE-2011-4682", "CVE-2011-4683", "CVE-2012-1924", "CVE-2012-1925", "CVE-2012-1926", "CVE-2012-1927", "CVE-2012-1928", "CVE-2012-1930", "CVE-2012-1931", "CVE-2012-3555", "CVE-2012-3556", "CVE-2012-3557", "CVE-2012-3558", "CVE-2012-3560", "CVE-2012-3561"], "modified": "2012-06-15T00:00:00", "id": "GLSA-201206-03", "href": "https://security.gentoo.org/glsa/201206-03", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}