Vulnerabilites related to unix - unix
Vulnerability from fkie_nvd
Published
2013-01-02 11:46
Modified
2025-04-11 00:51
Severity ?
Summary
Opera before 12.12 on UNIX uses weak permissions for the profile directory, which allows local users to obtain sensitive information by reading a (1) cache file, (2) password file, or (3) configuration file, or (4) possibly gain privileges by modifying or overwriting a configuration file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "D467A29D-D3DF-46B8-A455-866A267BC3A8", "versionEndIncluding": "12.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "0F892EEF-54EC-4EC0-84B3-BD5C216AED80", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*", "matchCriteriaId": "089BEFE3-24B2-4C73-BA25-7C905ED68A50", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "3B73E6B0-2113-4D09-A665-7D8FEC3A3D59", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "76AECDD0-C14D-4A68-AF2E-1C41A51089EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*", "matchCriteriaId": "1C06EBBF-8B64-4C22-9EDA-E133AFD205DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*", "matchCriteriaId": "D888C22C-41F9-427D-9249-F010891DA48E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "326AE3EE-3BF3-4B7E-B3FC-445FB9D6E4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*", "matchCriteriaId": "94FAD06C-830A-4CB6-B9AF-7E093B64B69B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*", "matchCriteriaId": "C9BDFBD0-3CAC-4617-B1B2-7F95E7C648D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "5366D587-7E77-4288-AB31-48108D04E0B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*", "matchCriteriaId": "60EFFC44-A329-4FA5-B57C-FA8892F8226B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*", "matchCriteriaId": "9241CFD0-9E61-487F-B076-2D7B8ACEA381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*", "matchCriteriaId": "ACEE8213-BD3A-405B-BC4C-8B80EBDF5A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*", "matchCriteriaId": "0A9A60F2-516D-4ECA-9ABC-4887EC4176E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*", "matchCriteriaId": "AB49750B-DAA1-4417-8384-1F4D47F2227D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*", "matchCriteriaId": "1099D38B-82EC-43C9-9DF5-D5EDC19834DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*", "matchCriteriaId": "A6D64030-1877-4F29-8340-93DB6E0F1F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*", "matchCriteriaId": "E5AC1241-B922-4BE7-93C1-077FC0DA1CA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "D65D0F7A-9414-4CF5-8460-DFDB55F61E5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "85184E8A-C42D-4CBD-ACB4-B58752C305D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*", "matchCriteriaId": "D422BB16-9F9C-4554-B2F1-826EB5BCB1ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*", "matchCriteriaId": "DA682571-536B-4CD9-A820-47E897B01480", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*", "matchCriteriaId": "298457B8-051B-46D0-81B4-C5B63B69EB98", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*", "matchCriteriaId": "D7D4BC07-C37E-4F99-8DEA-54A45250050A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B80FF-7ACB-43F5-9BD5-BF18A0EB4DD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "5120A672-FB60-4DC3-A171-102793C05835", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:alpha:*:*:*:*:*:*", "matchCriteriaId": "85DB12A2-D43F-47BE-9719-466BE967E30E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "matchCriteriaId": "C4C04948-023C-4569-9EFA-3BD4B254BBC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AFB451E-465F-4EC6-B13B-520B49F3BE8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "matchCriteriaId": "137E9883-BF1D-4B54-A904-AFDE179452A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "35400232-18B1-4641-8C98-6E8EB3A9C7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "matchCriteriaId": "90EFC130-7E02-47AE-AC4E-569B59241FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "matchCriteriaId": "EDDA25B9-3CE3-44F8-8B94-05E1840DBCE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "matchCriteriaId": "EFB733B4-2DDD-4180-9E53-D399D499691D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "matchCriteriaId": "57C77E63-E7CF-4EFF-9177-715C1815A0F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "matchCriteriaId": "4D74A8DF-DCD2-41AB-BDC1-A314B3B55DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:beta1:*:*:*:*:*:*", "matchCriteriaId": "2180C5E4-0756-4034-A724-4BE220F28C09", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "matchCriteriaId": "EECA4D0B-0313-4B34-9A69-EE91ECC37270", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "matchCriteriaId": "46482B92-C1CF-4B50-B419-568262B6F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.60:alpha:*:*:*:*:*:*", "matchCriteriaId": "E1D20372-9A36-4673-A8DA-413DAE04DCF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "F4619C12-AA06-4465-B595-47FC844B28A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "matchCriteriaId": "C2046AA8-079B-49F9-A2F6-FCF58B509A70", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "matchCriteriaId": "9D44F551-F0DF-4261-A13C-B81A4BD64D1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "matchCriteriaId": "542D7F0A-01AF-4377-A96A-348651F56B98", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*", "matchCriteriaId": "72EEEE50-F5DD-413F-8937-7B1AFB151DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*", "matchCriteriaId": "52A509DF-759B-466A-9D6E-4E4D559B0F8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*", "matchCriteriaId": "CB95842D-6899-4ECD-B7F9-5CC62BE9D4AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "5ACBA660-9AF0-40E2-8E9B-67E00D495023", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "matchCriteriaId": "52A36E55-80F8-40CD-A7DD-7FC291DCC3BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.11:*:*:*:*:*:*:*", "matchCriteriaId": "D98C5934-589D-4C86-9DD5-C72D3EA1F60E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*", "matchCriteriaId": "2A2BE3AD-767D-4ED1-A361-037957EBBA0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*", "matchCriteriaId": "A1A640B6-6EEE-4968-AF1E-0B2D1160B2B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*", "matchCriteriaId": "D0285C49-B30B-4C30-9E58-7A541B5E036C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*", "matchCriteriaId": "86DC6DAB-7263-4EA4-B4DC-17A47F61A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.52.1100:*:*:*:*:*:*:*", "matchCriteriaId": "B820AB27-91C3-44D8-B9B6-10DB9905067A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.60:*:*:*:*:*:*:*", "matchCriteriaId": "B6692220-BFFE-49F0-BDDE-171E40B90C1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.60:beta:*:*:*:*:*:*", "matchCriteriaId": "65619BBE-F7F0-48FB-877B-5D0431766098", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.61:*:*:*:*:*:*:*", "matchCriteriaId": "933AAA5D-7558-46EA-A5F5-639E504F60C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.62:*:*:*:*:*:*:*", "matchCriteriaId": "4509B34E-A6BB-4853-BB27-B23B2F3E2718", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.64:*:*:*:*:*:*:*", "matchCriteriaId": "F5B81C0D-ECE7-425D-9149-133D9F698753", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.65:*:*:*:*:*:*:*", "matchCriteriaId": "204FBAA0-35AE-4CDE-8592-15233FB2CB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.66:*:*:*:*:*:*:*", "matchCriteriaId": "06B8555C-80CF-49A9-A7BF-3ADF0DEA03F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:12.00:*:*:*:*:*:*:*", "matchCriteriaId": "4ECE9D17-A9DC-44FA-A54D-C7CBE413767D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:12.00:beta:*:*:*:*:*:*", "matchCriteriaId": "1591C7A0-AFE1-4742-951F-333073E630D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:12.01:*:*:*:*:*:*:*", "matchCriteriaId": "457CB163-1463-4A0E-AD31-3EE09A7CFC30", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:12.02:*:*:*:*:*:*:*", "matchCriteriaId": "7CB8E7C6-19EE-418D-95BB-6512CC0B82A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "571E5723-6DFA-4BBB-AD58-B55B3B8BA575", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:12.10:beta:*:*:*:*:*:*", "matchCriteriaId": "444151A1-7A14-490E-A78E-7F85094AF346", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Opera before 12.12 on UNIX uses weak permissions for the profile directory, which allows local users to obtain sensitive information by reading a (1) cache file, (2) password file, or (3) configuration file, or (4) possibly gain privileges by modifying or overwriting a configuration file." }, { "lang": "es", "value": "Opera antes de v12.12 en UNIX utiliza permisos d\u00e9biles para el directorio de perfiles, lo que permite a usuarios locales obtener informaci\u00f3n sensible mediante (1) la lectura de un archivo de cach\u00e9, (2) el archivo de contrase\u00f1as, (3) el archivo de configuraci\u00f3n, o (4) posiblemente obtener privilegios al modificar o sobrescribir un archivo de configuraci\u00f3n.\r\n" } ], "id": "CVE-2012-6472", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-01-02T11:46:23.133", "references": [ { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/unified/1212/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/kb/view/1039/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/unified/1212/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/kb/view/1039/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-08 12:54
Modified
2025-04-11 00:51
Severity ?
Summary
Opera before 10.50 on Windows, before 10.52 on Mac OS X, and before 10.60 on UNIX platforms makes widget properties accessible to third-party domains, which allows remote attackers to obtain potentially sensitive information via a crafted web site.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:beta2:*:*:*:*:*:*", "matchCriteriaId": "2AC0A47C-DEF4-4531-BE51-0EFDA1345884", "versionEndIncluding": "10.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "matchCriteriaId": "137E9883-BF1D-4B54-A904-AFDE179452A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:beta2:*:*:*:*:*:*", "matchCriteriaId": "E493399F-672A-4565-83D3-C0B1D083C510", "versionEndIncluding": "10.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "5120A672-FB60-4DC3-A171-102793C05835", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "matchCriteriaId": "EDDA25B9-3CE3-44F8-8B94-05E1840DBCE4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:beta1:*:*:*:*:*:*", "matchCriteriaId": "FFDDD5C4-D5A8-4D6D-BA09-C4F83D77A35B", "versionEndIncluding": "10.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "matchCriteriaId": "C4C04948-023C-4569-9EFA-3BD4B254BBC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "matchCriteriaId": "4D74A8DF-DCD2-41AB-BDC1-A314B3B55DAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Opera before 10.50 on Windows, before 10.52 on Mac OS X, and before 10.60 on UNIX platforms makes widget properties accessible to third-party domains, which allows remote attackers to obtain potentially sensitive information via a crafted web site." }, { "lang": "es", "value": "Opera anterior a v10.50 en Windows, anterior a v10.52 en Mac OS X, y anterior a v10.60 en plataformas UNIX hace accesibles las propiedades de los widges a dominios de terceros, lo cual permite a los atacantes remotos obtener informaci\u00f3n potencialmente sensible a trav\u00e9s de sitios web manipulados." } ], "id": "CVE-2010-2659", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-07-08T12:54:47.303", "references": [ { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/mac/1052/" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/windows/1050/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/search/view/959/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/mac/1052/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/windows/1050/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/search/view/959/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11096" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-20 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
IBM DB2 UDB 9.1 before Fixpak 4 does not properly perform vector aggregation, which might allow attackers to cause a denial of service (divide-by-zero error and DBMS crash), related to an "overflow." NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | windows | * | |
unix | unix | * | |
ibm | db2_universal_database | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:*:fp3a:*:*:*:*:*", "matchCriteriaId": "D90DD96D-B5DE-47CD-94EA-E8C058F8D548", "versionEndIncluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 9.1 before Fixpak 4 does not properly perform vector aggregation, which might allow attackers to cause a denial of service (divide-by-zero error and DBMS crash), related to an \"overflow.\" NOTE: the vendor description of this issue is too vague to be certain that it is security-related." }, { "lang": "es", "value": "IBM DB2 UDB 9.1 anterior a Fixpak 4 no realiza adecuadamente la suma de vector, lo cual permite a atacantes provocar denegaci\u00f3n de servicio (error de divisi\u00f3n por zero y caida DBMS), relacionad con un \"desbordamiento\". NOTA: la descripci\u00f3n del vendedor de este asunto es muy vaga como para afirmar que se trata de un asunto de seguridad." } ], "id": "CVE-2007-6052", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-20T20:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ08205" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ08205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-13 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "matchCriteriaId": "C42D46A5-DB0B-48EF-8587-C2CEDAA14A4A", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37854E7C-2166-48D7-AE8C-44C9468C38C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "24A7CF98-27EC-406A-98E2-ACC1AAAF5C93", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC1BD70D-7A92-4309-A40C-9BD500997390", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9C17896-8895-4731-B77A-F488A94F0CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF9F1050-B6BE-4B99-882B-36D6E187304D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7BDB18D-A53C-4252-B2ED-42E6F3609277", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*", "matchCriteriaId": "3CBE2E6C-AF0E-4A77-9EB0-3593889BC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*", "matchCriteriaId": "4B5C5C14-383C-4630-858E-D40D6C32FD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "35B1CA6B-600C-4E03-B4D5-3D7E1BC4D0F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "F7AA1BA3-9FFA-46AB-A92A-7247D5F7EA06", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3F5F7424-1E19-4078-8908-CD86A0185042", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "0D968113-340A-4E5A-B4FD-D9702D49E3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9628AFF9-6EE1-4E85-858F-AE96EE64B7F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C36D10A8-D211-437D-98D8-9029D0A9CF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA55D00C-3629-48E4-8699-F62B8D703E02", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "623324C2-C8B5-4C3C-9C10-9677D5A6740A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "634396D6-4ED6-4F4D-9458-396373489589", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A265869-EF58-428E-B8BB-30CABCBE0A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADB421CD-85DE-4495-93B7-46708449AE27", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "32049561-270C-4B18-9E96-EA0F66ACECAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5491D310-E1C0-4FCB-9DCA-97CA1F95D4BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors." }, { "lang": "es", "value": "Adobe Reader y Acrobat v9.x anterior a v9.3, y 8.x anterior a v8.2, sobre Windows y Mac OS X, podr\u00eda permitir a atacantes provocar una denegaci\u00f3n de servicio (deferencia a puntero NULL) a trav\u00e9s de vectores no especificados." } ], "evaluatorComment": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\na null-pointer dereference vulnerability that could lead to denial of service (CVE-2009-3957).", "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\nAffected software versions\r\n\r\nAdobe Reader 9.2 and earlier versions for Windows, Macintosh, and UNIX\r\nAdobe Acrobat 9.2 and earlier versions for Windows and Macintosh", "id": "CVE-2009-3957", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-13T19:30:00.530", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/37760" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55555" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55555" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7975" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-20 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the DB2DART tool in IBM DB2 UDB 9.1 before Fixpak 4 allows attackers to execute arbitrary commands as the DB2 instance owner, related to invocation of TPUT by DB2DART.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | windows | * | |
unix | unix | * | |
ibm | db2_universal_database | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:*:fp3a:*:*:*:*:*", "matchCriteriaId": "D90DD96D-B5DE-47CD-94EA-E8C058F8D548", "versionEndIncluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the DB2DART tool in IBM DB2 UDB 9.1 before Fixpak 4 allows attackers to execute arbitrary commands as the DB2 instance owner, related to invocation of TPUT by DB2DART." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la herramienta DB2DART en IBM DB2 UDB 9.1 anterior a Fixpak 4 permite a atacantes ejecutar comandos de su elecci\u00f3n como la instancia propietario DB2, relacionado con la invocaci\u00f3n de TPUT por DB2DART." } ], "id": "CVE-2007-6047", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-20T20:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03646" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Petitforum stores the liste.txt data file under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as e-mail addresses and encrypted passwords.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | all_windows | * | |
unix | unix | any_version | |
petitforum | petitforum | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AB4B29F-4C60-48A0-8F58-BCBDC58B697E", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:any_version:*:*:*:*:*:*:*", "matchCriteriaId": "CF8C2159-A91B-4599-BDDA-AEC890150B00", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:petitforum:petitforum:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3C23772-F667-492B-8C19-BD26CB805FB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Petitforum stores the liste.txt data file under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as e-mail addresses and encrypted passwords." } ], "id": "CVE-2003-1423", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1006117" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1006117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11358" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) login.php, (2) register.php, (3) post.php, and (4) common.php in Phorum before 3.4.3 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AB4B29F-4C60-48A0-8F58-BCBDC58B697E", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:any_version:*:*:*:*:*:*:*", "matchCriteriaId": "CF8C2159-A91B-4599-BDDA-AEC890150B00", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:phorum:phorum:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF010968-6E3B-430A-BF06-9F63EEA3EC03", "versionEndIncluding": "3.4.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:phorum:phorum:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6650BE9D-5F4B-4B22-BD7E-ABCC067D5455", "vulnerable": true }, { "criteria": "cpe:2.3:a:phorum:phorum:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B8E0CA9-F6D4-4DD3-A3EA-F3A40965261B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) login.php, (2) register.php, (3) post.php, and (4) common.php in Phorum before 3.4.3 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors." } ], "id": "CVE-2003-1467", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3288" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/321310" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/7572" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/7573" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/7576" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/7577" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/7584" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12487" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12502" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/321310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/7572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/7573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/7576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/7577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/7584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12502" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-03-28 03:22
Modified
2025-04-11 00:51
Severity ?
Summary
Opera before 11.62 on UNIX uses world-readable permissions for temporary files during printing, which allows local users to obtain sensitive information by reading these files.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "CABCDF5B-A553-4525-B1C6-BF1C53523669", "versionEndIncluding": "11.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "5120A672-FB60-4DC3-A171-102793C05835", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "matchCriteriaId": "C4C04948-023C-4569-9EFA-3BD4B254BBC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "matchCriteriaId": "137E9883-BF1D-4B54-A904-AFDE179452A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "35400232-18B1-4641-8C98-6E8EB3A9C7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "matchCriteriaId": "90EFC130-7E02-47AE-AC4E-569B59241FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "matchCriteriaId": "EDDA25B9-3CE3-44F8-8B94-05E1840DBCE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "matchCriteriaId": "EFB733B4-2DDD-4180-9E53-D399D499691D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "matchCriteriaId": "57C77E63-E7CF-4EFF-9177-715C1815A0F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:beta1:*:*:*:*:*:*", "matchCriteriaId": "2180C5E4-0756-4034-A724-4BE220F28C09", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "matchCriteriaId": "EECA4D0B-0313-4B34-9A69-EE91ECC37270", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "matchCriteriaId": "46482B92-C1CF-4B50-B419-568262B6F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "F4619C12-AA06-4465-B595-47FC844B28A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "matchCriteriaId": "C2046AA8-079B-49F9-A2F6-FCF58B509A70", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "matchCriteriaId": "9D44F551-F0DF-4261-A13C-B81A4BD64D1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "matchCriteriaId": "542D7F0A-01AF-4377-A96A-348651F56B98", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "5ACBA660-9AF0-40E2-8E9B-67E00D495023", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "matchCriteriaId": "52A36E55-80F8-40CD-A7DD-7FC291DCC3BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.11:*:*:*:*:*:*:*", "matchCriteriaId": "D98C5934-589D-4C86-9DD5-C72D3EA1F60E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*", "matchCriteriaId": "2A2BE3AD-767D-4ED1-A361-037957EBBA0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*", "matchCriteriaId": "A1A640B6-6EEE-4968-AF1E-0B2D1160B2B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*", "matchCriteriaId": "D0285C49-B30B-4C30-9E58-7A541B5E036C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*", "matchCriteriaId": "86DC6DAB-7263-4EA4-B4DC-17A47F61A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.60:*:*:*:*:*:*:*", "matchCriteriaId": "B6692220-BFFE-49F0-BDDE-171E40B90C1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.60:beta:*:*:*:*:*:*", "matchCriteriaId": "65619BBE-F7F0-48FB-877B-5D0431766098", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Opera before 11.62 on UNIX uses world-readable permissions for temporary files during printing, which allows local users to obtain sensitive information by reading these files." }, { "lang": "es", "value": "Opera antes de v11.62 en UNIX asigna permisos de lectura para todo el mundo a los archivos temporales durante la impresi\u00f3n, lo que permite a usuarios locales obtener informaci\u00f3n sensible mediante la lectura de estos archivos." } ], "id": "CVE-2012-1930", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-03-28T03:22:10.440", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/48535" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/kb/view/1015/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48535" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/kb/view/1015/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74501" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-08 12:54
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Opera before 10.54 on Windows and Mac OS X, and before 10.11 on UNIX platforms, allows remote attackers to inject arbitrary web script or HTML via a data: URI, related to incorrect detection of the "opening site."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEB4377-E28F-4EF8-A687-5CE7162E585D", "versionEndIncluding": "10.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "matchCriteriaId": "137E9883-BF1D-4B54-A904-AFDE179452A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "matchCriteriaId": "90EFC130-7E02-47AE-AC4E-569B59241FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEB4377-E28F-4EF8-A687-5CE7162E585D", "versionEndIncluding": "10.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "5120A672-FB60-4DC3-A171-102793C05835", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "matchCriteriaId": "EDDA25B9-3CE3-44F8-8B94-05E1840DBCE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "matchCriteriaId": "EFB733B4-2DDD-4180-9E53-D399D499691D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "730D0C1C-2BE5-4CFB-B487-0FAAC4AAD986", "versionEndIncluding": "10.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Opera before 10.54 on Windows and Mac OS X, and before 10.11 on UNIX platforms, allows remote attackers to inject arbitrary web script or HTML via a data: URI, related to incorrect detection of the \"opening site.\"" }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Opera anterior a v10.54 en Windows y Mac OS X, y anterior a v10.11 en las plataformas UNIX, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de un data: URI, relacionados con la detecci\u00f3n incorrecta de \"opening site\" (abriendo sitio)." } ], "id": "CVE-2010-2665", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-07-08T12:54:47.473", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40250" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/unix/1011/" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/windows/1054/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/kb/view/955/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/40973" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60646" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/unix/1011/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/windows/1054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/kb/view/955/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/40973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11362" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-13 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow remote attackers to execute arbitrary code via unspecified initialization parameters.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "matchCriteriaId": "C42D46A5-DB0B-48EF-8587-C2CEDAA14A4A", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37854E7C-2166-48D7-AE8C-44C9468C38C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "24A7CF98-27EC-406A-98E2-ACC1AAAF5C93", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC1BD70D-7A92-4309-A40C-9BD500997390", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9C17896-8895-4731-B77A-F488A94F0CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF9F1050-B6BE-4B99-882B-36D6E187304D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7BDB18D-A53C-4252-B2ED-42E6F3609277", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*", "matchCriteriaId": "3CBE2E6C-AF0E-4A77-9EB0-3593889BC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*", "matchCriteriaId": "4B5C5C14-383C-4630-858E-D40D6C32FD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "35B1CA6B-600C-4E03-B4D5-3D7E1BC4D0F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "F7AA1BA3-9FFA-46AB-A92A-7247D5F7EA06", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3F5F7424-1E19-4078-8908-CD86A0185042", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "0D968113-340A-4E5A-B4FD-D9702D49E3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9628AFF9-6EE1-4E85-858F-AE96EE64B7F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C36D10A8-D211-437D-98D8-9029D0A9CF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA55D00C-3629-48E4-8699-F62B8D703E02", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "623324C2-C8B5-4C3C-9C10-9677D5A6740A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "634396D6-4ED6-4F4D-9458-396373489589", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A265869-EF58-428E-B8BB-30CABCBE0A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADB421CD-85DE-4495-93B7-46708449AE27", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "32049561-270C-4B18-9E96-EA0F66ACECAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5491D310-E1C0-4FCB-9DCA-97CA1F95D4BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow remote attackers to execute arbitrary code via unspecified initialization parameters." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el Download Manager en Adobe Reader y Acrobat v9.x anterior a v9.3, y 8.x anterior a v8.2, sobre Windows y Mac OS X, podr\u00eda permitir a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "evaluatorComment": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\na buffer overflow vulnerability in the Download Manager that could lead to code execution (CVE-2009-3958).", "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\n\r\nAffected software versions\r\n\r\nAdobe Reader 9.2 and earlier versions for Windows, Macintosh, and UNIX\r\nAdobe Acrobat 9.2 and earlier versions for Windows and Macintosh", "id": "CVE-2009-3958", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-13T19:30:00.560", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/773545" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/37759" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55556" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/773545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8455" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-20 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
IBM DB2 UDB 9.1 before Fixpak 4 uses incorrect permissions on ACLs for DB2NODES.CFG, which has unknown impact and attack vectors. NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | windows | * | |
unix | unix | * | |
ibm | db2_universal_database | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:*:fp3a:*:*:*:*:*", "matchCriteriaId": "D90DD96D-B5DE-47CD-94EA-E8C058F8D548", "versionEndIncluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 9.1 before Fixpak 4 uses incorrect permissions on ACLs for DB2NODES.CFG, which has unknown impact and attack vectors. NOTE: the vendor description of this issue is too vague to be certain that it is security-related." }, { "lang": "es", "value": "IBM DB2 UDB 9.1 anterior Fixpack 4 utiliza permisos incorrectos sobre ACLs para DB2NODES.CFG, lo cual tiene un impacto desconocido y vectores de ataque. NOTA: la descripci\u00f3n del vendedor de este asunto es muy vaga como para afirmar que es un asunto de seguridad." } ], "id": "CVE-2007-6048", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-20T20:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/41017" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26989" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-13 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "matchCriteriaId": "C42D46A5-DB0B-48EF-8587-C2CEDAA14A4A", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37854E7C-2166-48D7-AE8C-44C9468C38C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "24A7CF98-27EC-406A-98E2-ACC1AAAF5C93", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC1BD70D-7A92-4309-A40C-9BD500997390", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9C17896-8895-4731-B77A-F488A94F0CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF9F1050-B6BE-4B99-882B-36D6E187304D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7BDB18D-A53C-4252-B2ED-42E6F3609277", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*", "matchCriteriaId": "3CBE2E6C-AF0E-4A77-9EB0-3593889BC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*", "matchCriteriaId": "4B5C5C14-383C-4630-858E-D40D6C32FD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "35B1CA6B-600C-4E03-B4D5-3D7E1BC4D0F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "F7AA1BA3-9FFA-46AB-A92A-7247D5F7EA06", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3F5F7424-1E19-4078-8908-CD86A0185042", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "0D968113-340A-4E5A-B4FD-D9702D49E3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9628AFF9-6EE1-4E85-858F-AE96EE64B7F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C36D10A8-D211-437D-98D8-9029D0A9CF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA55D00C-3629-48E4-8699-F62B8D703E02", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "623324C2-C8B5-4C3C-9C10-9677D5A6740A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "634396D6-4ED6-4F4D-9458-396373489589", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A265869-EF58-428E-B8BB-30CABCBE0A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADB421CD-85DE-4495-93B7-46708449AE27", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "32049561-270C-4B18-9E96-EA0F66ACECAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5491D310-E1C0-4FCB-9DCA-97CA1F95D4BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document." }, { "lang": "es", "value": "Desbordamiento de entero en la implementaci\u00f3n U3D en Adobe Reader y Acrobat v9.x anterior a v9.3, y 8.x anterior a v8.2, sobre Windows y Mac OS X, podr\u00eda permitir a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "evaluatorComment": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\nan integer overflow vulnerability in U3D support that could lead to code execution (CVE-2009-3959).", "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\nAffected software versions\r\n\r\nAdobe Reader 9.2 and earlier versions for Windows, Macintosh, and UNIX\r\nAdobe Acrobat 9.2 and earlier versions for Windows and Macintosh", "id": "CVE-2009-3959", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-13T19:30:00.593", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/38138" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/38215" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/508949" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/37756" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "psirt@adobe.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55557" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8539" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/508949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8539" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-06-22 20:30
Modified
2025-04-09 00:30
Severity ?
Summary
Absolute path traversal vulnerability in cvs.php in OCS Inventory NG before 1.02.1 on Unix allows remote attackers to read arbitrary files via a full pathname in the log parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ocsinventory-ng | ocs_inventory_ng | * | |
ocsinventory-ng | ocs_inventory_ng | 1.0 | |
ocsinventory-ng | ocs_inventory_ng | 1.0 | |
ocsinventory-ng | ocs_inventory_ng | 1.0 | |
ocsinventory-ng | ocs_inventory_ng | 1.0 | |
ocsinventory-ng | ocs_inventory_ng | 1.0 | |
ocsinventory-ng | ocs_inventory_ng | 1.0 | |
ocsinventory-ng | ocs_inventory_ng | 1.01 | |
ocsinventory-ng | ocs_inventory_ng | 1.02 | |
ocsinventory-ng | ocs_inventory_ng | 1.02 | |
ocsinventory-ng | ocs_inventory_ng | 1.02 | |
unix | unix | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C51BBFA-8405-4499-A743-8458318281F2", "versionEndIncluding": "1.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9C9D8DD-6505-4903-9181-26223DA65DD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.0:beta:*:*:*:*:*:*", "matchCriteriaId": "CCBDA19C-8B65-4D0D-80B6-3C1E76C5BE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3E915093-BDDA-4A75-A0D0-819246D94249", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "5CDE845A-A67A-4DCC-BC61-FC64C6943C3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "B363C2E6-FAB1-4CED-9C0D-3797AEC814E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.0:rc3-1:*:*:*:*:*:*", "matchCriteriaId": "F8B28BF3-C16C-458A-BC9B-23631D2B7623", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "1D9ACDD1-0586-47F1-9421-F4D176BF438E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.02:rc1:*:*:*:*:*:*", "matchCriteriaId": "73D26134-3129-432B-AA9E-5062E2792F10", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.02:rc2:*:*:*:*:*:*", "matchCriteriaId": "A113F25A-CC82-428A-AA56-16BBA3D3C736", "vulnerable": true }, { "criteria": "cpe:2.3:a:ocsinventory-ng:ocs_inventory_ng:1.02:rc3:*:*:*:*:*:*", "matchCriteriaId": "C0FCAE6C-0F9F-4B8A-97B4-2EF4ED76C5FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in cvs.php in OCS Inventory NG before 1.02.1 on Unix allows remote attackers to read arbitrary files via a full pathname in the log parameter." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio absoluto en cvs.php en OCS Inventory NG versiones anteriores a v1.02.1 para Unix permite a atacantes remotos leer ficheros de su elecci\u00f3n indicando la ruta de directorio completa en el par\u00e1metro \"log\"." } ], "id": "CVE-2009-2166", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-06-22T20:30:00.297", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.leidecker.info/advisories/2009-05-30-ocs_inventory_ng_directory_traversal.shtml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/504047/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50946" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/8868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.leidecker.info/advisories/2009-05-30-ocs_inventory_ng_directory_traversal.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/504047/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50946" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/8868" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1999-02-22 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Process table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine's process tables through multiple connections to network services.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Process table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine\u0027s process tables through multiple connections to network services." } ], "id": "CVE-1999-0377", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-02-22T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1033881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033881" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-14 16:26
Modified
2025-04-09 00:30
Severity ?
Summary
UCM-CQ in IBM Rational ClearCase 7.0.0.x before 7.0.0.5, 7.0.1.x before 7.0.1.4, and 7.1.x before 7.1.0.1 on Linux and AIX places a username and password on the command line, which allows local users to obtain credentials by listing the process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | rational_clearcase | 7.0 | |
ibm | rational_clearcase | 7.0.0.1 | |
ibm | rational_clearcase | 7.0.0.2 | |
ibm | rational_clearcase | 7.0.0.3 | |
ibm | rational_clearcase | 7.0.0.4 | |
ibm | rational_clearcase | 7.0.1 | |
ibm | rational_clearcase | 7.0.1.1 | |
ibm | rational_clearcase | 7.0.1.2 | |
ibm | rational_clearcase | 7.0.1.3 | |
ibm | rational_clearcase | 7.1 | |
ibm | aix | * | |
unix | unix | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F09C7-CF4B-42FA-ADDD-189E60813590", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D00DF56-BFB1-4B91-95A4-0A2F33074AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "58FCE9A7-B9C0-470D-A71D-2A94F826A907", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "E41B2A6E-F8F9-4D81-840A-B520BC557515", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "63308FC2-AE4D-4D50-B969-6AB28A77E550", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED125939-3657-45AC-8F41-F61B08B4A220", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "89778E9A-90E8-4467-A33B-5F2BB0762A55", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FCCE7749-300A-452B-B428-9CF1DB000205", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6E293794-7223-46EE-BA6A-EF0535566312", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "EDAC2996-1ACC-423C-BEA5-D86652A748D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "UCM-CQ in IBM Rational ClearCase 7.0.0.x before 7.0.0.5, 7.0.1.x before 7.0.1.4, and 7.1.x before 7.1.0.1 on Linux and AIX places a username and password on the command line, which allows local users to obtain credentials by listing the process." }, { "lang": "es", "value": "UCM-CQ en IBM Rational ClearCase 7.0.0.x versiones anteriores a v7.0.0.5, 7.0.1.x versiones anteriores a v7.0.1.4, y 7.1.x versiones anteriores a v7.1.0.1 en Linux y AIX sit\u00faa un nombre de usuario y una contrase\u00f1a en la l\u00ednea de comandos, lo cual permite a usuarios locales obtener credenciales listando el proceso." } ], "id": "CVE-2009-1292", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-14T16:26:56.140", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34689" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK75832" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34483" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022035" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/1017" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK75832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49836" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-05 18:17
Modified
2025-04-11 00:51
Severity ?
Summary
mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | http_server | 2.2.9 | |
unix | unix | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "AB63EBE5-CF14-491E-ABA5-67116DFE3E5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions." }, { "lang": "es", "value": "mod_proxy en httpd del servidor HTTP Apache v2.2.9, cuando se ejecuta en Unix, no cierra la conexi\u00f3n interna si se produce un fin de tiempo de espera al leer una respuesta de una conexi\u00f3n persistente, lo que permite a atacantes remotos obtener una respuesta potencialmente sensibles, destinada a un cliente diferente en circunstancias oportunistas a trav\u00e9s de una petici\u00f3n HTTP normal. NOTA: este es el mismo problema que CVE-2010-2068, pero para un Sistema Operativo diferente y un conjunto de versiones afectadas." } ], "id": "CVE-2010-2791", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-05T18:17:57.667", "references": [ { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/07/30/1" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0659.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/42102" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60883" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/07/30/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0659.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-08 12:54
Modified
2025-04-11 00:51
Severity ?
Summary
Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict certain uses of homograph characters in domain names, which makes it easier for remote attackers to spoof IDN domains via unspecified choices of characters.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEB4377-E28F-4EF8-A687-5CE7162E585D", "versionEndIncluding": "10.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "matchCriteriaId": "137E9883-BF1D-4B54-A904-AFDE179452A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "matchCriteriaId": "90EFC130-7E02-47AE-AC4E-569B59241FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEB4377-E28F-4EF8-A687-5CE7162E585D", "versionEndIncluding": "10.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "5120A672-FB60-4DC3-A171-102793C05835", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "matchCriteriaId": "EDDA25B9-3CE3-44F8-8B94-05E1840DBCE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "matchCriteriaId": "EFB733B4-2DDD-4180-9E53-D399D499691D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:beta1:*:*:*:*:*:*", "matchCriteriaId": "FFDDD5C4-D5A8-4D6D-BA09-C4F83D77A35B", "versionEndIncluding": "10.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "matchCriteriaId": "C4C04948-023C-4569-9EFA-3BD4B254BBC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "matchCriteriaId": "4D74A8DF-DCD2-41AB-BDC1-A314B3B55DAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict certain uses of homograph characters in domain names, which makes it easier for remote attackers to spoof IDN domains via unspecified choices of characters." }, { "lang": "es", "value": "Opera anterior a v10.54 en Windows y Mac OS X, y anterior a v10.60 en las plataformas UNIX, no limita propiamente determinados usos de los caracteres en los nombres de dominio hom\u00f3grafos, lo cual facilita a los atacantes remotos suplantar dominios IDN a trav\u00e9s de opciones no especificadas de caracteres." } ], "id": "CVE-2010-2660", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-07-08T12:54:47.333", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40250" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/windows/1054/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/search/view/961/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/40973" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/windows/1054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/search/view/961/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/40973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11603" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-02 12:43
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the web management interface in InterSect Alliance Snare Agent 3.2.3 and earlier on Solaris, Snare Agent 3.1.7 and earlier on Windows, Snare Agent 1.5.0 and earlier on Linux and AIX, Snare Agent 1.4 and earlier on IRIX, Snare Epilog 1.5.3 and earlier on Windows, and Snare Epilog 1.2 and earlier on UNIX allow remote attackers to hijack the authentication of administrators for requests that (1) change the password or (2) change the listening port.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://holisticinfosec.org/content/view/144/45/ | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/39562 | Broken Link | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/173009 | Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.securityfocus.com/bid/41226 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://holisticinfosec.org/content/view/144/45/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39562 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/173009 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41226 | Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "89C72256-1076-4ADE-99FD-3211D4210571", "versionEndIncluding": "3.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "52F1E105-8DD0-4A70-B776-118C0AD297CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "90D62C11-8F19-4EA2-B69A-4AD59A285DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "9C12A8C4-BF04-4B1B-8B50-EF6E9BDB14F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "08EE9563-7416-4572-9B73-8D67F82DD2BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "36F767D0-6ACB-40AC-8260-0F43E1CB7332", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2432243-5B6A-49B7-A18D-BF902872880B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "776ADA38-8323-44FC-BB85-823BB31E0FE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "0C74F35D-5B2B-413B-8297-4F8EA65A0CC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDF910EF-2A69-4B43-B487-EF476412BFF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "316DADD7-21E6-4729-AE75-87DD21977E1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "23ED0D79-6929-4E77-96EB-3A4DA40E3E2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "55318889-CE1E-4C38-BC61-7A31F4C4502C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B22AFA6-E731-49E4-91B7-8659B156D63A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "526D1EBD-BBFA-42C7-96D6-5B24E447D6C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5C0B63D1-6D64-4640-A0DA-4A0603456057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "E64BBC83-2C9E-4B35-ACF5-E4A0DD4CACB9", "versionEndIncluding": "3.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "23ED0D79-6929-4E77-96EB-3A4DA40E3E2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "55318889-CE1E-4C38-BC61-7A31F4C4502C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CE0B343C-3313-480E-AD50-8844C5EE3107", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "78246ED3-92E1-4036-B46E-391F398FD05D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "307FF903-7722-4AE3-B36B-5ED492A0115E", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB68669D-D718-482A-BA8D-8231E9AA6D50", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "29DC5182-860C-4D2D-8427-E00A3D0B05F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "60EC86B8-5C8C-4873-B364-FB1F8EFE1CFF", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*", "matchCriteriaId": "E61F1C9B-44AF-4B35-A7B2-948EEF7639BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "0259B24D-3DB9-4A77-BF45-E392A548F4E9", "versionEndIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "D25BE641-7C32-4A45-9B3A-8517923B72ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "86A81EDD-98C2-41FA-B3ED-E846E4E287D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "ADE10B2C-41B5-47D3-AE56-874198DFE8EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:0.9.7a:*:*:*:*:*:*:*", "matchCriteriaId": "FC197C77-DD26-43B2-9147-90B476E45891", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "94641156-1C85-42AB-B201-CE81432274BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9D6CCDA-376C-402B-AC90-5578374B5461", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "43FC0A2E-F5F4-4334-8D76-AC097F7BA29B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A301F579-FC14-4FF0-8383-A0E12B2D461F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B093131-CABA-4B30-8A2F-E11F3E3D3E51", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "673EE9E4-8465-4659-B65E-5215B09732B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AB364B9-E2DB-4FEF-B53F-D3F014B48BDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A0A0446-6190-44B7-BE90-1B07A3A650D9", "versionEndIncluding": "1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9D6CCDA-376C-402B-AC90-5578374B5461", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A301F579-FC14-4FF0-8383-A0E12B2D461F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B093131-CABA-4B30-8A2F-E11F3E3D3E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*", "matchCriteriaId": "056B3397-81A9-4128-9F49-ECEBE1743EE8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDBAE0DE-4F29-45D5-9B9E-8C9D4D02BD31", "versionEndIncluding": "1.5.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "49A8709F-5400-4946-B08E-7FF0812DB679", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D1BF5FF-6148-49E1-B58B-E46EA24F7953", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "883D033D-F5D4-4FFD-85F8-CE4054470362", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7231A15-25B7-4D09-B19E-676B2A8F98D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBE17A5C-4ED8-4E9A-8E41-730F70D709E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9552E0E7-6E7D-4807-9D9E-AF4956C47C61", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "52003973-A127-4E33-899A-5533035CF445", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "C3F842B9-11DE-44DB-B49D-9927E28FE571", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "3749470D-5AFD-4391-9CBD-B346CDF76B15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D371D01-1212-43AD-807A-871FDBC64C9E", "versionEndIncluding": "1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_epilog:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "49A8709F-5400-4946-B08E-7FF0812DB679", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "0259B24D-3DB9-4A77-BF45-E392A548F4E9", "versionEndIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9D6CCDA-376C-402B-AC90-5578374B5461", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A301F579-FC14-4FF0-8383-A0E12B2D461F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B093131-CABA-4B30-8A2F-E11F3E3D3E51", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "673EE9E4-8465-4659-B65E-5215B09732B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFC2625D-4978-4D3E-930F-7A4E1AE97832", "versionEndIncluding": "1.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9D6CCDA-376C-402B-AC90-5578374B5461", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C3104865-CA72-4EA6-B12F-C1866B838C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7BA01B6-7ABB-4A61-8349-CDF81B38016C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D9262BE-6BD7-48D5-BE9E-66404F6B4C02", "vulnerable": true }, { "criteria": "cpe:2.3:a:intersect_alliance:snare_agent:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4BC22219-2F56-4562-B409-1F504A734064", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web management interface in InterSect Alliance Snare Agent 3.2.3 and earlier on Solaris, Snare Agent 3.1.7 and earlier on Windows, Snare Agent 1.5.0 and earlier on Linux and AIX, Snare Agent 1.4 and earlier on IRIX, Snare Epilog 1.5.3 and earlier on Windows, and Snare Epilog 1.2 and earlier on UNIX allow remote attackers to hijack the authentication of administrators for requests that (1) change the password or (2) change the listening port." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en la interfaz de gesti\u00f3n Web de InterSect Alliance Snare Agent v3.2.3 y anteriores en Solaris, Snare Agent v3.1.7 y anteriores en Windows, Snare Agent v1.5.0 y anteriores en Linux y AIX, Snare Agent v1.4 y anteriores en IRIX, Snare Epilog v1.5.3 y anteriores en Windows, y Snare Epilog v1.2 y anteriores en UNIX permiten a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para solicitudes que (1) modifiquen la contrase\u00f1a o (2) cambien el puerto de escucha." } ], "id": "CVE-2010-2594", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-07-02T12:43:52.970", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://holisticinfosec.org/content/view/144/45/" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/39562" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/173009" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/41226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://holisticinfosec.org/content/view/144/45/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/39562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/173009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/41226" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-20 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
IBM DB2 UDB 9.1 before Fixpak 4 assigns incorrect privileges to the (1) DB2ADMNS and (2) DB2USERS alternative groups, which has unknown impact. NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | windows | * | |
unix | unix | * | |
ibm | db2_universal_database | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:*:fp3a:*:*:*:*:*", "matchCriteriaId": "D90DD96D-B5DE-47CD-94EA-E8C058F8D548", "versionEndIncluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 9.1 before Fixpak 4 assigns incorrect privileges to the (1) DB2ADMNS and (2) DB2USERS alternative groups, which has unknown impact. NOTE: the vendor description of this issue is too vague to be certain that it is security-related." }, { "lang": "es", "value": "IBM DB2 UDB 9.1 anterior a Fixpak 4 asigna privilegios incorrectos en los grupos alternativos (1) DB2ADMNS y (2) DB2USERS, lo cual tiene un impacto desconocido. NOTA: la descripci\u00f3n del vendedor de este asunto es muy vaga para afirmar que se trata de un asunto de seguridad." } ], "id": "CVE-2007-6051", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-20T20:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/41011" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26854" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-16 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "F56B1726-4F05-4732-9D8B-077EF593EAEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", "matchCriteriaId": "A258374F-55CB-48D2-9094-CD70E1288F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "627B0DA4-E600-49F1-B455-B4E151B33236", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "54BD8F96-BB75-4961-B1E0-049F2273100D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9C14B310-65F0-475D-A2DD-0AD706805A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "356A0FAF-A25C-4D11-A70F-94B311B5778E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "958768B5-ABA3-4843-986D-499AD480832B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "0335CEAA-ED55-46AA-98D9-693733CDA68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "8DC590C7-5BDE-4E46-9605-01E95B17F01F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", "matchCriteriaId": "DCFE67F4-6907-4967-96A3-1757EADA72BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A328CC7F-5D02-4C7C-82CE-139EB2689C18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "0F56EC75-4C65-4CD7-981D-823E1411CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1E2D30C1-BDE8-4C1C-A8B3-A635A74E5D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "CB6F49FE-2332-4CAF-A11D-CDE46A71447F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5D0D8BBD-F727-4957-8128-10A4C456FBD0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "B57C5136-7853-478B-A342-6013528B41B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CC1E1EE7-379E-4047-962D-0A311EB0DB1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C113D6BE-88CD-4670-A0FA-8E78EBAF9A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4FC7DF0-7006-4805-9CA3-9A950DAA8D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3CA4B45-E643-4705-9B6C-8598A5357326", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADD314C8-A849-46C6-9ADD-72A2DF4C3219", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "9731EFE2-A5BE-4389-A92D-DDC573633B6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F9B4B357-27C7-4926-936C-A100A7AD538B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "978027C8-4DF6-4C18-A31D-1ACFBA857E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "366E85EF-ED5F-4D4D-9CBE-E69F7248CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "56C05D36-1343-4571-9886-E1AE8952E096", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en el componente PRC de Adobe Reader y Acrobat 9.x en versiones anteriores a la 9.4.7 en Windows, Adobe Reader y Acrobat 9.x hasta la 9.4.6 en Mac OS X, Adobe Reader y Acrobat 10.x hasta la 10.1.1 en Windows y Mac OS X, y Adobe Reader 9.x hasta la 9.4.6 en UNIX. Permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de vectores desconocidos, como se ha explotado en diciembro del 2011." } ], "id": "CVE-2011-4369", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-16T19:55:00.987", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-30.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.redhat.com/support/errata/RHSA-2012-0011.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/51092" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-350A.html" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-30.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2012-0011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-350A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14865" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-20 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the SSL LOAD GSKIT action in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, involving a call to dlopen when the effective uid is root.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
unix | unix | * | |
ibm | db2_universal_database | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:*:fp3a:*:*:*:*:*", "matchCriteriaId": "D90DD96D-B5DE-47CD-94EA-E8C058F8D548", "versionEndIncluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SSL LOAD GSKIT action in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, involving a call to dlopen when the effective uid is root." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la acci\u00f3n SSL LOAD GSKIT en IBM DB2 UDB 9.1 anterior a Fixpak 4 tiene un impacto desconocido y vectores de ataque, afectando a la llamada a dlopen cuando el uid efectivo es root." } ], "id": "CVE-2007-6049", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-20T20:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/41013" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ05461" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ05461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Invision Power Services Invision Board 1.0 through 1.1.1, when a forum is password protected, stores the administrator password in a cookie in plaintext, which could allow remote attackers to gain access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | all_windows | * | |
unix | unix | * | |
invision_power_services | invision_board | 1.0 | |
invision_power_services | invision_board | 1.0.1 | |
invision_power_services | invision_board | 1.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AB4B29F-4C60-48A0-8F58-BCBDC58B697E", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:invision_power_services:invision_board:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AC7F0E6-7DA6-41E3-9F73-4FFF699195C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:invision_power_services:invision_board:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EAA35A95-B8FD-4ED8-95E0-409E50BF13AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:invision_power_services:invision_board:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D4066556-F0CE-4E8B-B88D-C3BA03D98D95", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Invision Power Services Invision Board 1.0 through 1.1.1, when a forum is password protected, stores the administrator password in a cookie in plaintext, which could allow remote attackers to gain access." } ], "id": "CVE-2003-1454", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3276" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/319747" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/7440" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/319747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/7440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11871" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-13 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "matchCriteriaId": "C42D46A5-DB0B-48EF-8587-C2CEDAA14A4A", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37854E7C-2166-48D7-AE8C-44C9468C38C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "24A7CF98-27EC-406A-98E2-ACC1AAAF5C93", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC1BD70D-7A92-4309-A40C-9BD500997390", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9C17896-8895-4731-B77A-F488A94F0CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF9F1050-B6BE-4B99-882B-36D6E187304D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7BDB18D-A53C-4252-B2ED-42E6F3609277", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*", "matchCriteriaId": "3CBE2E6C-AF0E-4A77-9EB0-3593889BC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*", "matchCriteriaId": "4B5C5C14-383C-4630-858E-D40D6C32FD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "35B1CA6B-600C-4E03-B4D5-3D7E1BC4D0F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "F7AA1BA3-9FFA-46AB-A92A-7247D5F7EA06", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3F5F7424-1E19-4078-8908-CD86A0185042", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "0D968113-340A-4E5A-B4FD-D9702D49E3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9628AFF9-6EE1-4E85-858F-AE96EE64B7F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C36D10A8-D211-437D-98D8-9029D0A9CF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA55D00C-3629-48E4-8699-F62B8D703E02", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "623324C2-C8B5-4C3C-9C10-9677D5A6740A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "634396D6-4ED6-4F4D-9458-396373489589", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A265869-EF58-428E-B8BB-30CABCBE0A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADB421CD-85DE-4495-93B7-46708449AE27", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "32049561-270C-4B18-9E96-EA0F66ACECAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5491D310-E1C0-4FCB-9DCA-97CA1F95D4BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a \"script injection vulnerability,\" as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers." }, { "lang": "es", "value": "La configuraci\u00f3n por defecto en Adobe Reader y Acrobat v9.x anterior a v9.3, y 8.x anterior a v8.2, sobre Windows y Mac OS X, no soporta adecuadamente la funcionalidad Enhanced Security, que tiene un impacto y vectores de ataque desconocidos relacionados con \"una vulnerabilidad de inyecci\u00f3n de secuencias de comandos\"." } ], "evaluatorComment": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\na script injection vulnerability by changing the Enhanced Security default (CVE-2009-3956).", "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\nAffected software versions\r\n\r\nAdobe Reader 9.2 and earlier versions for Windows, Macintosh, and UNIX\r\nAdobe Acrobat 9.2 and earlier versions for Windows and Macintosh", "id": "CVE-2009-3956", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-13T19:30:00.513", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/38138" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/38215" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.packetstormsecurity.org/1001-exploits/SS-2010-001.txt" }, { "source": "psirt@adobe.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/37763" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "psirt@adobe.com", "url": "http://www.stratsec.net/files/SS-2010-001_Stratsec_Acrobat_Script_Injection_Security_Advisory_v1.0.pdf" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "psirt@adobe.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554296" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55554" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.packetstormsecurity.org/1001-exploits/SS-2010-001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.stratsec.net/files/SS-2010-001_Stratsec_Acrobat_Script_Injection_Security_Advisory_v1.0.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8327" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Album.pl 6.1 allows remote attackers to execute arbitrary commands, when an alternative configuration file is used, via unknown attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | all_windows | * | |
unix | unix | * | |
mike_bobbitt | album.pl | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AB4B29F-4C60-48A0-8F58-BCBDC58B697E", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:mike_bobbitt:album.pl:*:*:*:*:*:*:*:*", "matchCriteriaId": "E10B3E59-BA11-4DFB-A4E0-E96D4BCAA1B0", "versionEndIncluding": "6.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Album.pl 6.1 allows remote attackers to execute arbitrary commands, when an alternative configuration file is used, via unknown attack vectors." } ], "id": "CVE-2003-1456", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://perl.bobbitt.ca/yabbse/index.php?board=2%3Baction=display%3Bthreadid=720" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3270" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/archive/1/319763" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/7444" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://perl.bobbitt.ca/yabbse/index.php?board=2%3Baction=display%3Bthreadid=720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/archive/1/319763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/7444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11878" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-09 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:openafs:openafs:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBC8B64A-B5A9-4F66-86AD-0288F8E3D62D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE08E0AC-71F8-456B-9E88-43E94A6A2F47", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "10CFD4A8-71AE-4F85-B86D-001461ECC2E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8CD3D4A8-934B-420A-AF4A-36DD16E2F851", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9D7AD53C-917A-41CC-83CD-6DF825E2640E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.0.4a:*:*:*:*:*:*:*", "matchCriteriaId": "F6F84C9B-8073-4EBE-AA75-A373772A42EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E921700-C76F-41EA-AA61-6F939ED329CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC9A5221-2DBC-487A-9C6D-84EB9C95EB05", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0BDBD251-3E96-4068-AD24-E5B1802769E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.1.1a:*:*:*:*:*:*:*", "matchCriteriaId": "23A07568-7B15-49F1-9163-40A0BFF38309", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8A18760-0921-475E-9104-4DF480697E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CD01B5F6-7E91-4FE8-B345-42D58C786FCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "34002792-689C-45B5-9B5A-94B5342AC20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.2a:*:*:*:*:*:*:*", "matchCriteriaId": "3331166E-ABBA-4326-8EF4-88872B9824A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.2b:*:*:*:*:*:*:*", "matchCriteriaId": "302A9220-4C73-4D69-8B62-B64A7E280B31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B8FC287-D6D8-44BA-9125-3E64624ECDFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "295C09E5-23C3-4F9E-80FC-B0C4EC34C846", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "0295B94D-BE71-4DA2-81C5-E5BBCF0E17AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "2FBADEB7-0073-42EB-B53D-ADA227898493", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "F0951C53-C62A-4607-B6DB-E6B38DF3A5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "0813CDDB-FF48-4154-81F3-20873A6C6C45", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "6AAAE0E9-BB79-455F-A08E-AC83370DBD0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "55B65ACE-3BA2-4B42-AEE8-8F647A6399F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "C0E298D9-63FB-4818-A2F1-EDFC287625F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "E3F2EED9-29E6-41E9-A911-D6ED9A08643C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "299D4344-A1DB-4EC3-B1A2-5E07FB2B585F", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "72BE26C0-4A71-43AE-B134-3CE6DE839349", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE590EA3-85F6-462A-BCC1-0550192F8F9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "20DB0E2F-782F-4BA1-A81A-5DDDA8CF0A79", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.3.70:*:*:*:*:*:*:*", "matchCriteriaId": "3C1399FC-A356-4624-BBA6-059B797B4C2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.3.74:*:*:*:*:*:*:*", "matchCriteriaId": "5D767864-04D5-4571-8B13-CD347ADB3ADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.3.77:*:*:*:*:*:*:*", "matchCriteriaId": "C47CECE6-1BD8-4CC3-B1F8-A4A069004C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.3.81:*:*:*:*:*:*:*", "matchCriteriaId": "846D8776-DCDF-4BD0-A391-5546BD4B20C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "58C9013E-A08B-441E-AE3F-C688793366FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0F37635-C186-4D06-A79C-2A7AB0CFBAD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "CB1364B7-D564-4385-B7D7-67184E474712", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA3D7891-0B48-4C5D-B74B-6810FB4696F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "2C3BF7B2-72FF-4756-A1CC-982A1CD0747C", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "832A44D5-3851-4DC5-A37A-B3C356764B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6F42FFC-9EA1-471C-8E5F-F8860BB2EA06", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.7_pre1:*:*:*:*:*:*:*", "matchCriteriaId": "91E0060C-4C43-4B4C-88CE-01F5055A9193", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.7_pre2:*:*:*:*:*:*:*", "matchCriteriaId": "4F1A3516-7785-406E-83B2-96A0FF8461A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.7_pre3:*:*:*:*:*:*:*", "matchCriteriaId": "F020E77C-8445-4BE8-A36E-A436102FE83B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.7_pre4:*:*:*:*:*:*:*", "matchCriteriaId": "39F16D28-5011-4CE3-A656-9F9908E760AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.7_pre5:*:*:*:*:*:*:*", "matchCriteriaId": "1F1E040E-020D-4567-BF57-9A2DA7294CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "38D14A4C-D467-431A-A223-9383FD94EB12", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.8_pre1:*:*:*:*:*:*:*", "matchCriteriaId": "ED10F836-88BE-4832-BE5A-83AE0C798368", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.8_pre2:*:*:*:*:*:*:*", "matchCriteriaId": "CA22C60E-64A4-4340-A780-0C85BDACBB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.4.8_pre3:*:*:*:*:*:*:*", "matchCriteriaId": "F407281C-A813-4190-BBF1-FB93779681DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "4C6BEEDA-C1FE-49BA-A829-BA3BBBED1AFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "39308049-0C20-4845-9803-529A85CB9682", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "CAC63C9E-169F-40B5-A011-2A77B675875D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.26:*:*:*:*:*:*:*", "matchCriteriaId": "378F38A7-422C-4603-8120-42DB91C8B90D", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.27:*:*:*:*:*:*:*", "matchCriteriaId": "69AC18EA-7DB6-4F68-95DD-637D557DDF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.30:*:*:*:*:*:*:*", "matchCriteriaId": "BFD8DE00-622E-42DC-B1C7-8B9C1300DEF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.31:*:*:*:*:*:*:*", "matchCriteriaId": "A6FCFBC7-CDEF-402D-8C11-DD3D112B76CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.32:*:*:*:*:*:*:*", "matchCriteriaId": "22ABC36E-79A7-41A6-8A80-CF3563EE640E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.33:*:*:*:*:*:*:*", "matchCriteriaId": "9E121D95-158B-446D-BECD-D90D348A8CE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.34:*:*:*:*:*:*:*", "matchCriteriaId": "C2993321-45A6-496F-ADC3-B83E52B90ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.35:*:*:*:*:*:*:*", "matchCriteriaId": "4EA6732C-6108-40B1-B9D3-D11D9C18B225", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.36:*:*:*:*:*:*:*", "matchCriteriaId": "A93DE322-6843-4C9C-82F2-2E55FC5231DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.38:*:*:*:*:*:*:*", "matchCriteriaId": "52D0C9D5-009C-4153-AB84-1DC3191CAC72", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.39:*:*:*:*:*:*:*", "matchCriteriaId": "18AAA5FE-D9FE-40A8-804B-C86C2D865958", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.50:*:*:*:*:*:*:*", "matchCriteriaId": "ADCB63E5-D32E-41E3-958D-F1991318CFA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.52:*:*:*:*:*:*:*", "matchCriteriaId": "7FDE6F07-DD16-4075-B7C4-4C3B9A194C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.53:*:*:*:*:*:*:*", "matchCriteriaId": "B0B8EC69-A4CD-42F8-AD25-ACE8DDAE7F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.54:*:*:*:*:*:*:*", "matchCriteriaId": "9F3B0624-435B-4A06-BC13-5B47C34E11E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.55:*:*:*:*:*:*:*", "matchCriteriaId": "A8F90E76-4EF0-4E12-96F9-1007DF457277", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.56:*:*:*:*:*:*:*", "matchCriteriaId": "F3944EFB-9C8C-451E-A339-603FC617A352", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.57:*:*:*:*:*:*:*", "matchCriteriaId": "5B400BB8-53F2-4BC3-842B-42480B52D156", "vulnerable": true }, { "criteria": "cpe:2.3:a:openafs:openafs:1.5.58:*:*:*:*:*:*:*", "matchCriteriaId": "5A1C5AD7-141A-4932-9A05-994B6CC69AC8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en el gestor de cach\u00e9 en el cliente OpenAFS v1.0 hasta la v1.4.8 y v1.5.0 hasta la 1.5.58 de las plataformas Unix, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del sistema) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una respuesta RX que contenga m\u00e1s datos que los especificados en la petici\u00f3n, relativo al uso de las tablas XDR." } ], "id": "CVE-2009-1251", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-09T00:30:00.327", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34655" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34684" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42896" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201101-05.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1768" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:099" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.openafs.org/security/OPENAFS-SA-2009-001.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.openafs.org/security/openafs-sa-2009-001.patch" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34407" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0984" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201101-05.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.openafs.org/security/OPENAFS-SA-2009-001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openafs.org/security/openafs-sa-2009-001.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0117" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-10 21:46
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 7 R3.2.0 allow attackers to gain privileges via "some HMC commands."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
unix | unix | any_version | |
ibm | hardware_management_console | 7.3.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:any_version:*:*:*:*:*:*:*", "matchCriteriaId": "CF8C2159-A91B-4599-BDDA-AEC890150B00", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:hardware_management_console:7.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEB6EA1E-7AC0-4A32-9CA7-DEEE147D7160", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 7 R3.2.0 allow attackers to gain privileges via \"some HMC commands.\"" }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en IBM Hardware Management Console (HMC) 7 R3.2.0 permite a atacantes obtener privilegios mediante \"algunos comandos HMC\"." } ], "id": "CVE-2007-6305", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-12-10T21:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27961" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1MB02226" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019062" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/4144" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4038" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power6/install/v7.Readme.html#MH01065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1MB02226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/4144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power6/install/v7.Readme.html#MH01065" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-20 10:19
Modified
2025-04-09 00:30
Severity ?
Summary
SimpleFileServlet in IBM WebSphere Application Server 5.0.1 through 5.0.2.7 on Linux and UNIX does not block certain invalid URIs and does not issue a security challenge, which allows remote attackers to read secure files and obtain sensitive information via certain requests.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www-1.ibm.com/support/docview.wss?uid=swg24013029 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?uid=swg24013029 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
unix | unix | * | |
ibm | websphere_application_server | 5.0.1 | |
ibm | websphere_application_server | 5.0.2 | |
ibm | websphere_application_server | 5.0.2.1 | |
ibm | websphere_application_server | 5.0.2.2 | |
ibm | websphere_application_server | 5.0.2.3 | |
ibm | websphere_application_server | 5.0.2.4 | |
ibm | websphere_application_server | 5.0.2.5 | |
ibm | websphere_application_server | 5.0.2.6 | |
ibm | websphere_application_server | 5.0.2.7 | |
ibm | websphere_application_server | 5.0.2.8 | |
ibm | websphere_application_server | 5.0.2.9 | |
ibm | websphere_application_server | 5.0.2.10 | |
ibm | websphere_application_server | 5.0.2.11 | |
ibm | websphere_application_server | 5.0.2.12 | |
ibm | websphere_application_server | 5.0.2.13 | |
ibm | websphere_application_server | 5.0.2.14 | |
ibm | websphere_application_server | 5.0.2.15 | |
ibm | websphere_application_server | 5.0.2.16 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:ia32_64-bit:*:*:*:*:*", "matchCriteriaId": "4F8CD59E-22A6-4B56-8834-B8A18FBC1A7D", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8873A6A6-D840-48E2-AED2-BB8584E3817A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AB3F05B9-6EE1-4838-AD41-7DD329E71E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "91D25A56-D654-46B2-9437-2AAEE74655B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DA58B6E-9EA3-43F2-BC98-8178020F687C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "95BB9B87-8DBB-4FF9-8773-73281C3D52A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "37813D54-57C8-4C41-A42D-3C7BBAFA86B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "1444794B-F893-44B2-824F-24211B872C4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "D3B019F0-A728-4803-B036-14E10A5B0389", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "A2E4A501-A198-4462-8813-3D355B5BC212", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "AFC0955F-486F-41FF-ACA6-0DF4D966E800", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8451E82-F170-4182-A312-70DA75F96983", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "E6008404-9114-4BC1-A413-4A18B381E359", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "5FFF4792-5BFA-414B-BF84-A2308073E750", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "59E555D3-1A29-4D0B-B9C7-11A7A1C6119E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "0C347C1F-4B87-4F7C-8E9B-A99D37E9959F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "E6A195CF-B731-4EB6-8899-A7E6AAB14C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "9B91BF74-963C-48D9-BAA4-9869F181CD02", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "58B17701-C450-463F-8C60-6293EBA448FA", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SimpleFileServlet in IBM WebSphere Application Server 5.0.1 through 5.0.2.7 on Linux and UNIX does not block certain invalid URIs and does not issue a security challenge, which allows remote attackers to read secure files and obtain sensitive information via certain requests." }, { "lang": "es", "value": "SimpleFileServlet en IBM WebSphere Application Server 5.0.1 hasta 5.0.2.7 en Linux y UNIX no bloquea determinados URIs inv\u00e1lidos y no emite un desaf\u00edo de seguridad, lo cual permite a atacantes remotos leer archivos seguros y obtener informaci\u00f3n sensible mediante determinadas peticiones." } ], "id": "CVE-2006-7164", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-20T10:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013029" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-01-31 20:00
Modified
2025-04-09 00:30
Severity ?
Summary
PatchLink Update client for Unix, as used by Novell ZENworks Patch Management Update Agent for Linux/Unix/Mac (LUM) 6.2094 through 6.4102 and other products, allows local users to (1) truncate arbitrary files via a symlink attack on the /tmp/patchlink.tmp file used by the logtrimmer script, and (2) execute arbitrary code via a symlink attack on the /tmp/plshutdown file used by the rebootTask script.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:lumension_security:patchlink_update:6.2:*:linux:*:*:*:*:*", "matchCriteriaId": "DE956C6E-C5CA-4581-9D06-533F5CFAEBE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:lumension_security:patchlink_update:6.2:*:mac:*:*:*:*:*", "matchCriteriaId": "A3033F8C-FB42-4838-B944-FE24E2CFA022", "vulnerable": true }, { "criteria": "cpe:2.3:a:lumension_security:patchlink_update:6.2:*:unix:*:*:*:*:*", "matchCriteriaId": "A2CD08D1-5982-40E8-8B24-986710D2783A", "vulnerable": true }, { "criteria": "cpe:2.3:a:lumension_security:patchlink_update:6.3:*:linux:*:*:*:*:*", "matchCriteriaId": "E6C795ED-9FF2-4597-BA46-95A21CCE7EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:lumension_security:patchlink_update:6.3:*:mac:*:*:*:*:*", "matchCriteriaId": "CD18339F-3635-4DC5-AE03-475B1CDE4DD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:lumension_security:patchlink_update:6.3:*:unix:*:*:*:*:*", "matchCriteriaId": "F60919A1-946C-424B-A3FC-E276ECDBBB5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:lumension_security:patchlink_update:6.4:*:linux:*:*:*:*:*", "matchCriteriaId": "829ECFA8-8D23-47E3-8AD1-ACE034E9F870", "vulnerable": true }, { "criteria": "cpe:2.3:a:lumension_security:patchlink_update:6.4:*:mac:*:*:*:*:*", "matchCriteriaId": "8D47A23C-75D3-4AA6-A5D3-68F819537CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:lumension_security:patchlink_update:6.4:*:unix:*:*:*:*:*", "matchCriteriaId": "C80615EC-D419-44A2-9FE5-B399D0568639", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.2:*:linux:*:*:*:*:*", "matchCriteriaId": "965B9986-DE06-406F-AAA8-DA9A91FD548D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.2:*:mac:*:*:*:*:*", "matchCriteriaId": "48E534D2-F6C4-4E1A-90C9-659A02FAA02B", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.2:*:unix:*:*:*:*:*", "matchCriteriaId": "8D9CCF8F-B43E-4EEB-8425-6D04AA3EAA8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.3:*:linux:*:*:*:*:*", "matchCriteriaId": "DCB9DBE8-3B84-4131-B376-8186D7951D15", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.3:*:mac:*:*:*:*:*", "matchCriteriaId": "2498DE12-4CF9-4C02-A875-546075E712F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.3:*:unix:*:*:*:*:*", "matchCriteriaId": "3F1DAD3D-8DF1-48BC-AB54-F68651FEA2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.4:*:linux:*:*:*:*:*", "matchCriteriaId": "6360AF99-4871-43BF-98B9-ED195913B29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.4:*:mac:*:*:*:*:*", "matchCriteriaId": "B6F50520-BE7A-4AFB-9AF5-038466C73D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:zenworks_patch_management_update_agent:6.4:*:unix:*:*:*:*:*", "matchCriteriaId": "69E0B7A0-2B99-4C4E-A1EA-3B4FEDC04D69", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PatchLink Update client for Unix, as used by Novell ZENworks Patch Management Update Agent for Linux/Unix/Mac (LUM) 6.2094 through 6.4102 and other products, allows local users to (1) truncate arbitrary files via a symlink attack on the /tmp/patchlink.tmp file used by the logtrimmer script, and (2) execute arbitrary code via a symlink attack on the /tmp/plshutdown file used by the rebootTask script." }, { "lang": "es", "value": "El cliente PatchLink Update para Unix, tal y como es usado por Novell ZENworks Patch Management Update Agent para Linux/Unix/Mac (LUM) versiones 6.2094 hasta 6.4102 y otros productos, permite a los usuarios locales (1) truncar archivos arbitrarios por medio de un ataque de tipo symlink en el archivo /tmp/patchlink.tmp usado por el script logtrimmer y (2) ejecutar c\u00f3digo arbitrario por medio de un ataque tipo symlink en el archivo /tmp/plshutdown usado por el script rebootTask." } ], "id": "CVE-2008-0525", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-01-31T20:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28657" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28665" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3599" }, { "source": "cve@mitre.org", "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527" }, { "source": "cve@mitre.org", "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528" }, { "source": "cve@mitre.org", "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487103/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/27458" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019272" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0426" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39956" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39958" }, { "source": "cve@mitre.org", "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487103/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-13 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
The 3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to execute arbitrary code via unspecified vectors, related to a "DLL-loading vulnerability."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "matchCriteriaId": "C42D46A5-DB0B-48EF-8587-C2CEDAA14A4A", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "37854E7C-2166-48D7-AE8C-44C9468C38C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "24A7CF98-27EC-406A-98E2-ACC1AAAF5C93", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC1BD70D-7A92-4309-A40C-9BD500997390", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9C17896-8895-4731-B77A-F488A94F0CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "DF9F1050-B6BE-4B99-882B-36D6E187304D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7BDB18D-A53C-4252-B2ED-42E6F3609277", "versionEndIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*", "matchCriteriaId": "3CBE2E6C-AF0E-4A77-9EB0-3593889BC676", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*", "matchCriteriaId": "4B5C5C14-383C-4630-858E-D40D6C32FD4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "35B1CA6B-600C-4E03-B4D5-3D7E1BC4D0F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "F7AA1BA3-9FFA-46AB-A92A-7247D5F7EA06", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3F5F7424-1E19-4078-8908-CD86A0185042", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "0D968113-340A-4E5A-B4FD-D9702D49E3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9628AFF9-6EE1-4E85-858F-AE96EE64B7F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C36D10A8-D211-437D-98D8-9029D0A9CF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "BA55D00C-3629-48E4-8699-F62B8D703E02", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0EE5E1B7-7B91-4AE1-92AA-4F1763E1BA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "623324C2-C8B5-4C3C-9C10-9677D5A6740A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B8EAF5E3-F3B4-4AD3-B5F1-281AB0F9C57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "634396D6-4ED6-4F4D-9458-396373489589", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A265869-EF58-428E-B8BB-30CABCBE0A83", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADB421CD-85DE-4495-93B7-46708449AE27", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "32049561-270C-4B18-9E96-EA0F66ACECAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5491D310-E1C0-4FCB-9DCA-97CA1F95D4BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to execute arbitrary code via unspecified vectors, related to a \"DLL-loading vulnerability.\"" }, { "lang": "es", "value": "La implementaci\u00f3n 3D en Adobe Reader y Acrobat v9.x anterior a v9.3, y v8.x anterior a v8.2 sobre Windows y Mac OS X, podr\u00eda permitir a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados, relacionados con un \"vulnerabilidad de carga DLL\"." } ], "evaluatorComment": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\na DLL-loading vulnerability in 3D that could allow arbitrary code execution (CVE-2009-3954).", "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html\r\n\r\nAffected software versions\r\n\r\nAdobe Reader 9.2 and earlier versions for Windows, Macintosh, and UNIX\r\nAdobe Acrobat 9.2 and earlier versions for Windows and Macintosh", "id": "CVE-2009-3954", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-13T19:30:00.407", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/38138" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/38215" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/37761" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "psirt@adobe.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55552" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37761" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8528" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-06-30 18:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | acrobat | 9.0 | |
adobe | acrobat | 9.1 | |
adobe | acrobat | 9.1.1 | |
adobe | acrobat | 9.1.2 | |
adobe | acrobat | 9.1.3 | |
adobe | acrobat | 9.2 | |
adobe | acrobat | 9.3 | |
adobe | acrobat | 9.3.1 | |
adobe | acrobat | 9.3.2 | |
unix | unix | * | |
adobe | acrobat_reader | 9.0 | |
adobe | acrobat_reader | 9.1 | |
adobe | acrobat_reader | 9.1.1 | |
adobe | acrobat_reader | 9.1.2 | |
adobe | acrobat_reader | 9.1.3 | |
adobe | acrobat_reader | 9.2 | |
adobe | acrobat_reader | 9.3 | |
adobe | acrobat_reader | 9.3.1 | |
adobe | acrobat_reader | 9.3.2 | |
unix | unix | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Reader y Acrobat v9.x anterior a v9.3.3 en UNIX permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante vectores desconocidos" } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-15.html\r\n\r\n\u0027This update resolves a UNIX-only memory corruption vulnerability that could lead to code execution (CVE-2010-2203).\u0027", "id": "CVE-2010-2203", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-06-30T18:30:01.583", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/41235" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024159" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/41235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14495" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-20 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
IBM DB2 UDB 9.1 before Fixpak 4 does not properly handle use of large numbers of file descriptors, which might allow attackers to have an unknown impact involving "memory corruption." NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | windows | * | |
unix | unix | * | |
ibm | db2_universal_database | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:*:fp3a:*:*:*:*:*", "matchCriteriaId": "D90DD96D-B5DE-47CD-94EA-E8C058F8D548", "versionEndIncluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 9.1 before Fixpak 4 does not properly handle use of large numbers of file descriptors, which might allow attackers to have an unknown impact involving \"memory corruption.\" NOTE: the vendor description of this issue is too vague to be certain that it is security-related." }, { "lang": "es", "value": "IBM DB2 UDB 9.1 anterior a Fixpak 4 no maneja de forma adecuada la utilizaci\u00f3n de n\u00fameros grandes de descriptores de archivos, lo cual podr\u00eda permitira a atacantes tener un impacto desconocido afectando a \"corrupci\u00f3n de memoria\". NOTA: la descripci\u00f3n del vendedor de este asunto es muy vaga como para afirmar que esta relacionado con la seguridad." } ], "id": "CVE-2007-6053", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-20T20:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ04039" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ04039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-11-05 15:00
Modified
2025-04-09 00:30
Severity ?
Summary
Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:*:unknown:3d:*:*:*:*:*", "matchCriteriaId": "E3E09C95-5726-486C-86C6-F1E98D281DDD", "versionEndIncluding": "8.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:*:unknown:professional:*:*:*:*:*", "matchCriteriaId": "FF117631-0095-4139-AFAC-D2C9050674AD", "versionEndIncluding": "8.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:*:unknown:standard:*:*:*:*:*", "matchCriteriaId": "3AA6AB66-8399-41E9-9688-7EEC083AFEBB", "versionEndIncluding": "8.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:unknown:3d:*:*:*:*:*", "matchCriteriaId": "C05B37C5-3043-4398-B009-7FFD5AF9D9FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:unknown:professional:*:*:*:*:*", "matchCriteriaId": "73AE4111-A2AD-41A6-9F74-6C5DCBAD7B4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:unknown:standard:*:*:*:*:*", "matchCriteriaId": "A72B429E-3C05-49A2-8097-72D968473B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "matchCriteriaId": "612599DD-94C9-4ECF-8986-C3BF355779B4", "versionEndIncluding": "8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH." }, { "lang": "es", "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en Adobe Reader y Acrobat 8.1.2 y anteriores en Unix y Linux; permite a los atacantes ganar privilegios mediante un programa troyano en un directorio no especificado que est\u00e1 asociado a una RPATH no segura." } ], "id": "CVE-2008-4815", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-11-05T15:00:14.557", "references": [ { "source": "cve@mitre.org", "url": "http://download.oracle.com/sunalerts/1019937.1.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/32700" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/32872" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-19.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0974.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32100" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021140" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-309A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3001" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0098" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469882" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://download.oracle.com/sunalerts/1019937.1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0974.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-309A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46335" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-02 22:19
Modified
2025-04-09 00:30
Severity ?
Summary
IBM DB2 UDB 8.2 before Fixpak 7 (aka fixpack 14), and DB2 9 before Fix Pack 2, on UNIX allows the "fenced" user to access certain unauthorized directories.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "64D7ACC0-4CF4-4B60-902C-C47DFCD097A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp1:*:*:*:*:*:*", "matchCriteriaId": "55ABF9A3-7776-4C0B-A6CC-45955E42DA1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp2:*:*:*:*:*:*", "matchCriteriaId": "9DF77950-22DE-4BA2-A10F-10953F6119E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp3:*:*:*:*:*:*", "matchCriteriaId": "57F66472-61EC-4467-ACF6-2893BF9E4050", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp4:*:*:*:*:*:*", "matchCriteriaId": "403EF6EC-9EEF-40F1-BA5C-F6211AADC9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp5:*:*:*:*:*:*", "matchCriteriaId": "2CE8E119-58C7-4BF0-9C74-93F44E4FC732", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:8.2:fp6:*:*:*:*:*:*", "matchCriteriaId": "2F16D689-D091-47AA-96EC-6B419D4A6CD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFF280E6-CF00-4B71-B58A-2087D339C665", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:db2:9.0:fp1:*:*:*:*:*:*", "matchCriteriaId": "E26817B0-D685-41C6-8049-0EA752BD3950", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 8.2 before Fixpak 7 (aka fixpack 14), and DB2 9 before Fix Pack 2, on UNIX allows the \"fenced\" user to access certain unauthorized directories." }, { "lang": "es", "value": "IBM DB2 UDB 8.2 anterior a ixpak 7 (tambi\u00e9n conocido como fixpack 14), y DB2 9 anterior a Fix Pack 2, sobre UNIX permite al usuario \"cercano\" acceder a ciertos directorios no autorizados." } ], "id": "CVE-2007-1228", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:S/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 2.7, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-02T22:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24387" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY86711" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY87492" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22729" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1017731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY86711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY87492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017731" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-06-06 10:30
Modified
2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apple | mac_os_x | * | |
apple | mac_os_x | 10.0 | |
apple | mac_os_x | 10.0.1 | |
apple | mac_os_x | 10.0.2 | |
apple | mac_os_x | 10.0.3 | |
apple | mac_os_x | 10.0.4 | |
apple | mac_os_x | 10.1 | |
apple | mac_os_x | 10.1.1 | |
apple | mac_os_x | 10.1.2 | |
apple | mac_os_x | 10.1.3 | |
apple | mac_os_x | 10.1.4 | |
apple | mac_os_x | 10.1.5 | |
apple | mac_os_x | 10.2 | |
apple | mac_os_x | 10.2.1 | |
apple | mac_os_x | 10.2.2 | |
apple | mac_os_x | 10.2.3 | |
apple | mac_os_x | 10.2.4 | |
apple | mac_os_x | 10.2.5 | |
apple | mac_os_x | 10.2.6 | |
apple | mac_os_x | 10.2.7 | |
apple | mac_os_x | 10.2.8 | |
apple | mac_os_x | 10.3 | |
apple | mac_os_x | 10.3.1 | |
apple | mac_os_x | 10.3.2 | |
apple | mac_os_x | 10.3.3 | |
apple | mac_os_x | 10.3.4 | |
apple | mac_os_x | 10.3.5 | |
apple | mac_os_x | 10.3.6 | |
apple | mac_os_x | 10.3.7 | |
apple | mac_os_x | 10.3.8 | |
apple | mac_os_x | 10.3.9 | |
apple | mac_os_x | 10.4 | |
apple | mac_os_x | 10.4.1 | |
apple | mac_os_x | 10.4.2 | |
apple | mac_os_x | 10.4.3 | |
apple | mac_os_x | 10.4.4 | |
apple | mac_os_x | 10.4.5 | |
apple | mac_os_x | 10.4.6 | |
apple | mac_os_x | 10.4.7 | |
apple | mac_os_x | 10.4.8 | |
apple | mac_os_x | 10.4.9 | |
unix | unix | * | |
mozilla | firefox | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "99C273D1-ADFE-4B4C-B543-7B9CA741A117", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0BC31B69-3DE1-4CF3-ADC9-CA0BF1714CBF", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "77CC671C-6D89-4279-86F7-DDE1D4D9A0CA", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "066ABC3B-B395-42D2-95C0-5B810F91A6F0", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "01BC19FC-6E03-4000-AE4B-232E47FA76F2", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "421FC2DD-0CF7-44A2-A63C-5221689E2363", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0F8B70BC-42B7-453A-B506-7BE69D49A4B5", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FAAC6EA5-DCB2-4A50-A8BC-25CC43FAEF9B", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "CA32F7D8-02F8-4CFE-B193-2888807BC4D6", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A9DCDE70-07DA-4F0B-805F-6BA03D410CD6", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "CDCF4FB3-F781-46D5-BEE7-485B3DC78B83", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE52A344-8B07-480D-A57F-B1F6E6574F3B", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "56CC0444-570C-4BB5-B53A-C5CA0BD87935", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "62E3EED7-FE30-4620-B40B-9CC49B77408A", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "5AFD8BC6-4893-4D9D-A26E-27AAC864F94B", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9BD1F9A1-5ADB-451D-9525-D545E42D2B8F", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "D7A24978-2891-425C-ACF6-E8F5C839C54A", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "9B20E130-6078-4336-B614-273C27142B46", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "AB461678-560D-436E-A3AE-9E1E16DB0412", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "BFDADE04-29F0-446B-824B-0518880CF0A0", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED9BE602-A740-4CF7-9CAF-59061B16AB31", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "33E698C1-C313-40E6-BAF9-7C8F9CF02484", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BF2D00AC-FA2A-4C39-B796-DC19072862CF", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "421079DA-B605-4E05-9454-C30CF7631CF4", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "93B734BA-3435-40A9-B22B-5D56CEB865A7", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C4B57B3E-B1B2-4F13-99D3-4F9DB3C07B5E", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "30897327-44DD-4D6C-B8B6-2D66C44EA55D", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "B79D8F73-2E78-4A67-96BB-21AD9BCB0094", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "0760FDDB-38D3-4263-9B4D-1AF5E613A4F9", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFD4DE58-46C7-4E69-BF36-C5FD768B8248", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "CF824694-52DE-44E3-ACAD-60B2A84CD3CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "B73A0891-A37A-4E0D-AA73-B18BFD6B1447", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "0C580935-0091-4163-B747-750FB7686973", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "BB0F2132-8431-4CEF-9A3D-A69425E3834E", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "8719F3C4-F1DE-49B5-9301-22414A2B6F9C", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE", "vulnerable": false }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "matchCriteriaId": "C99BB6C8-1877-4B70-B6EF-952E200ABABE", "versionEndIncluding": "2.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en Mozilla Firefox 2.0.0.4 y anteriores en Mac OS X y Unix permite a atacantes remotos leer archivos de su elecci\u00f3n mediante secuencias ..%2F (punto punto, barra codificada) en un URI resource://." } ], "id": "CVE-2007-3073", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-06-06T10:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/" }, { "source": "cve@mitre.org", "url": "http://larholm.com/2007/05/25/firefox-0day-local-file-reading/" }, { "source": "cve@mitre.org", "url": "http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/35920" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25481" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/470500/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=367428" }, { "source": "cve@mitre.org", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=380994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://larholm.com/2007/05/25/firefox-0day-local-file-reading/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/470500/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=367428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=380994" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-08 12:54
Modified
2025-04-11 00:51
Severity ?
Summary
Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict access to the full pathname of a file selected for upload, which allows remote attackers to obtain potentially sensitive information via unspecified DOM manipulations.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEB4377-E28F-4EF8-A687-5CE7162E585D", "versionEndIncluding": "10.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", "matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", "matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "matchCriteriaId": "137E9883-BF1D-4B54-A904-AFDE179452A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "matchCriteriaId": "90EFC130-7E02-47AE-AC4E-569B59241FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEB4377-E28F-4EF8-A687-5CE7162E585D", "versionEndIncluding": "10.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "5120A672-FB60-4DC3-A171-102793C05835", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "matchCriteriaId": "EDDA25B9-3CE3-44F8-8B94-05E1840DBCE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "matchCriteriaId": "EFB733B4-2DDD-4180-9E53-D399D499691D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:beta1:*:*:*:*:*:*", "matchCriteriaId": "FFDDD5C4-D5A8-4D6D-BA09-C4F83D77A35B", "versionEndIncluding": "10.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "matchCriteriaId": "C4C04948-023C-4569-9EFA-3BD4B254BBC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*", "matchCriteriaId": "4D74A8DF-DCD2-41AB-BDC1-A314B3B55DAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict access to the full pathname of a file selected for upload, which allows remote attackers to obtain potentially sensitive information via unspecified DOM manipulations." }, { "lang": "es", "value": "Opera anterior a v10.54 en Windows y Mac OS X, y anterior a v10.60 en las plataformas UNIX, no restringe adecuadamente el acceso a la ruta completa de un archivo seleccionado para la carga, lo cual permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de manipulaciones DOM no especificados." } ], "id": "CVE-2010-2661", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-07-08T12:54:47.367", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40250" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/windows/1054/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/search/view/960/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/40973" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/windows/1054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/search/view/960/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/40973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11669" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in links.php script in myPHPNuke 1.8.8, and possibly earlier versions, allows remote attackers to inject arbitrary HTML and web script via the (1) ratenum or (2) query parameters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | all_windows | * | |
unix | unix | any_version | |
myphpnuke | myphpnuke | 1.8.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AB4B29F-4C60-48A0-8F58-BCBDC58B697E", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:any_version:*:*:*:*:*:*:*", "matchCriteriaId": "CF8C2159-A91B-4599-BDDA-AEC890150B00", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:myphpnuke:myphpnuke:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "0D673DA6-49A1-425C-8A59-66479784FD73", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in links.php script in myPHPNuke 1.8.8, and possibly earlier versions, allows remote attackers to inject arbitrary HTML and web script via the (1) ratenum or (2) query parameters." } ], "id": "CVE-2003-1372", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-02/0231.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/8125" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/3931" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/6892" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-02/0231.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/8125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/3931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/6892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11376" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-03-28 03:22
Modified
2025-04-11 00:51
Severity ?
Summary
Opera before 11.62 on UNIX, when used in conjunction with an unspecified printing application, allows local users to overwrite arbitrary files via a symlink attack on a temporary file during printing.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "matchCriteriaId": "CABCDF5B-A553-4525-B1C6-BF1C53523669", "versionEndIncluding": "11.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*", "matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*", "matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*", "matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "5120A672-FB60-4DC3-A171-102793C05835", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*", "matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*", "matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*", "matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*", "matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*", "matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*", "matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*", "matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*", "matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*", "matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*", "matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*", "matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*", "matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*", "matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*", "matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*", "matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*", "matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*", "matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*", "matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*", "matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*", "matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*", "matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*", "matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*", "matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*", "matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*", "matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*", "matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*", "matchCriteriaId": "C4C04948-023C-4569-9EFA-3BD4B254BBC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*", "matchCriteriaId": "137E9883-BF1D-4B54-A904-AFDE179452A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*", "matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*", "matchCriteriaId": "35400232-18B1-4641-8C98-6E8EB3A9C7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*", "matchCriteriaId": "90EFC130-7E02-47AE-AC4E-569B59241FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*", "matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*", "matchCriteriaId": "EDDA25B9-3CE3-44F8-8B94-05E1840DBCE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*", "matchCriteriaId": "EFB733B4-2DDD-4180-9E53-D399D499691D", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*", "matchCriteriaId": "57C77E63-E7CF-4EFF-9177-715C1815A0F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.53:beta1:*:*:*:*:*:*", "matchCriteriaId": "2180C5E4-0756-4034-A724-4BE220F28C09", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*", "matchCriteriaId": "EECA4D0B-0313-4B34-9A69-EE91ECC37270", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*", "matchCriteriaId": "46482B92-C1CF-4B50-B419-568262B6F38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*", "matchCriteriaId": "F4619C12-AA06-4465-B595-47FC844B28A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*", "matchCriteriaId": "C2046AA8-079B-49F9-A2F6-FCF58B509A70", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*", "matchCriteriaId": "9D44F551-F0DF-4261-A13C-B81A4BD64D1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*", "matchCriteriaId": "542D7F0A-01AF-4377-A96A-348651F56B98", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "5ACBA660-9AF0-40E2-8E9B-67E00D495023", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*", "matchCriteriaId": "52A36E55-80F8-40CD-A7DD-7FC291DCC3BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.11:*:*:*:*:*:*:*", "matchCriteriaId": "D98C5934-589D-4C86-9DD5-C72D3EA1F60E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*", "matchCriteriaId": "2A2BE3AD-767D-4ED1-A361-037957EBBA0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*", "matchCriteriaId": "A1A640B6-6EEE-4968-AF1E-0B2D1160B2B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*", "matchCriteriaId": "D0285C49-B30B-4C30-9E58-7A541B5E036C", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*", "matchCriteriaId": "86DC6DAB-7263-4EA4-B4DC-17A47F61A254", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.60:*:*:*:*:*:*:*", "matchCriteriaId": "B6692220-BFFE-49F0-BDDE-171E40B90C1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:opera:opera_browser:11.60:beta:*:*:*:*:*:*", "matchCriteriaId": "65619BBE-F7F0-48FB-877B-5D0431766098", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Opera before 11.62 on UNIX, when used in conjunction with an unspecified printing application, allows local users to overwrite arbitrary files via a symlink attack on a temporary file during printing." }, { "lang": "es", "value": "Opera antes de v11.62 en UNIX, cuando se utiliza junto con una aplicaci\u00f3n de impresi\u00f3n no se especificada, permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlace simb\u00f3lico en un archivo temporal durante la impresi\u00f3n." } ], "id": "CVE-2012-1931", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-03-28T03:22:10.503", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/48535" }, { "source": "cve@mitre.org", "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/kb/view/1015/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48535" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.opera.com/support/kb/view/1015/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74500" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-20 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in unspecified setuid programs in IBM DB2 UDB 9.1 before Fixpak 4 allows local users to have an unknown impact.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | windows | * | |
unix | unix | * | |
ibm | db2_universal_database | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:*:fp3a:*:*:*:*:*", "matchCriteriaId": "D90DD96D-B5DE-47CD-94EA-E8C058F8D548", "versionEndIncluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in unspecified setuid programs in IBM DB2 UDB 9.1 before Fixpak 4 allows local users to have an unknown impact." }, { "lang": "es", "value": "Vulnerabilidad no especificada en programas setuid no especificados en IBM DB2 UDB 9.1 anterior a Fixpak 4 permite a usuarios locales tener un impacto desconocido." } ], "id": "CVE-2007-6046", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-20T20:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ07018" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ07018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-20 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in DB2LICD in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, related to creation of an "insecure directory."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | windows | * | |
unix | unix | * | |
ibm | db2_universal_database | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:*:fp3a:*:*:*:*:*", "matchCriteriaId": "D90DD96D-B5DE-47CD-94EA-E8C058F8D548", "versionEndIncluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in DB2LICD in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, related to creation of an \"insecure directory.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada en DB2LICD en IBM DB2 UDB 9.1 anterior a Fixpak 4 tiene un impacto desconocido y vectores de ataque, relacionado con la creaci\u00f3n de un \"directorio no seguro\"." } ], "id": "CVE-2007-6050", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-20T20:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03881" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-20 20:46
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in (1) DB2WATCH and (2) DB2FREEZE in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
microsoft | windows | * | |
unix | unix | * | |
ibm | db2_universal_database | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A7C398-5356-45D6-AA5C-53E63BC88DCA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2_universal_database:*:*:fp3a:*:*:*:*:*", "matchCriteriaId": "D90DD96D-B5DE-47CD-94EA-E8C058F8D548", "versionEndIncluding": "9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in (1) DB2WATCH and (2) DB2FREEZE in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en (1) DB2WATCH y (2) DB2FREEZE \u00e7en IBM DB2 UDB 9.1 anterior a Fixpak 4 tiene un impacto desconocido y vectores de ataque." } ], "id": "CVE-2007-6045", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-20T20:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/41014" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/41015" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03655" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2009-3954 (GCVE-0-2009-3954)
Vulnerability from cvelistv5
Published
2010-01-13 19:00
Modified
2024-08-07 06:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The 3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to execute arbitrary code via unspecified vectors, related to a "DLL-loading vulnerability."
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.660Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38138", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38138" }, { "name": "acrobat-reader-3d-code-execution(55552)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55552" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "RHSA-2010:0060", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "name": "oval:org.mitre.oval:def:8528", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8528" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023446" }, { "name": "37761", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37761" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "name": "38215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38215" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The 3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to execute arbitrary code via unspecified vectors, related to a \"DLL-loading vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38138", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38138" }, { "name": "acrobat-reader-3d-code-execution(55552)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55552" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "RHSA-2010:0060", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "name": "oval:org.mitre.oval:def:8528", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8528" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023446" }, { "name": "37761", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37761" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "name": "38215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38215" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3954", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The 3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to execute arbitrary code via unspecified vectors, related to a \"DLL-loading vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38138", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38138" }, { "name": "acrobat-reader-3d-code-execution(55552)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55552" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "RHSA-2010:0060", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "name": "oval:org.mitre.oval:def:8528", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8528" }, { "name": "ADV-2010-0103", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023446" }, { "name": "37761", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37761" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=554293", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "name": "38215", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38215" }, { "name": "SUSE-SA:2010:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3954", "datePublished": "2010-01-13T19:00:00", "dateReserved": "2009-11-16T00:00:00", "dateUpdated": "2024-08-07T06:45:50.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6051 (GCVE-0-2007-6051)
Vulnerability from cvelistv5
Published
2007-11-20 20:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IBM DB2 UDB 9.1 before Fixpak 4 assigns incorrect privileges to the (1) DB2ADMNS and (2) DB2USERS alternative groups, which has unknown impact. NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:27.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "41011", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41011" }, { "name": "JR26854", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26854" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 9.1 before Fixpak 4 assigns incorrect privileges to the (1) DB2ADMNS and (2) DB2USERS alternative groups, which has unknown impact. NOTE: the vendor description of this issue is too vague to be certain that it is security-related." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "41011", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41011" }, { "name": "JR26854", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26854" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26450" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM DB2 UDB 9.1 before Fixpak 4 assigns incorrect privileges to the (1) DB2ADMNS and (2) DB2USERS alternative groups, which has unknown impact. NOTE: the vendor description of this issue is too vague to be certain that it is security-related." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "41011", "refsource": "OSVDB", "url": "http://osvdb.org/41011" }, { "name": "JR26854", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26854" }, { "name": "ADV-2007-3867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26450" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6051", "datePublished": "2007-11-20T20:00:00", "dateReserved": "2007-11-20T00:00:00", "dateUpdated": "2024-08-07T15:54:27.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6048 (GCVE-0-2007-6048)
Vulnerability from cvelistv5
Published
2007-11-20 20:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IBM DB2 UDB 9.1 before Fixpak 4 uses incorrect permissions on ACLs for DB2NODES.CFG, which has unknown impact and attack vectors. NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:26.957Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "41017", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41017" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "JR26989", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26989" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 9.1 before Fixpak 4 uses incorrect permissions on ACLs for DB2NODES.CFG, which has unknown impact and attack vectors. NOTE: the vendor description of this issue is too vague to be certain that it is security-related." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "41017", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41017" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "JR26989", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26989" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM DB2 UDB 9.1 before Fixpak 4 uses incorrect permissions on ACLs for DB2NODES.CFG, which has unknown impact and attack vectors. NOTE: the vendor description of this issue is too vague to be certain that it is security-related." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "41017", "refsource": "OSVDB", "url": "http://osvdb.org/41017" }, { "name": "ADV-2007-3867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26450" }, { "name": "JR26989", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR26989" }, { "name": "27667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27667" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6048", "datePublished": "2007-11-20T20:00:00", "dateReserved": "2007-11-20T00:00:00", "dateUpdated": "2024-08-07T15:54:26.957Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0525 (GCVE-0-2008-0525)
Vulnerability from cvelistv5
Published
2008-01-31 19:30
Modified
2024-08-07 07:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PatchLink Update client for Unix, as used by Novell ZENworks Patch Management Update Agent for Linux/Unix/Mac (LUM) 6.2094 through 6.4102 and other products, allows local users to (1) truncate arbitrary files via a symlink attack on the /tmp/patchlink.tmp file used by the logtrimmer script, and (2) execute arbitrary code via a symlink attack on the /tmp/plshutdown file used by the rebootTask script.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527" }, { "name": "27458", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27458" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html" }, { "name": "ADV-2008-0426", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0426" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528" }, { "name": "3599", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3599" }, { "name": "patchlinkupdate-reboottask-symlink(39958)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39958" }, { "name": "28657", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28657" }, { "name": "patchlinkupdate-logtrimmer-symlink(39956)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39956" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530" }, { "name": "28665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28665" }, { "name": "20080125 Two vulnerabilities for PatchLink Update Client for Unix.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487103/100/0/threaded" }, { "name": "1019272", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019272" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-25T00:00:00", "descriptions": [ { "lang": "en", "value": "PatchLink Update client for Unix, as used by Novell ZENworks Patch Management Update Agent for Linux/Unix/Mac (LUM) 6.2094 through 6.4102 and other products, allows local users to (1) truncate arbitrary files via a symlink attack on the /tmp/patchlink.tmp file used by the logtrimmer script, and (2) execute arbitrary code via a symlink attack on the /tmp/plshutdown file used by the rebootTask script." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527" }, { "name": "27458", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27458" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html" }, { "name": "ADV-2008-0426", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0426" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528" }, { "name": "3599", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3599" }, { "name": "patchlinkupdate-reboottask-symlink(39958)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39958" }, { "name": "28657", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28657" }, { "name": "patchlinkupdate-logtrimmer-symlink(39956)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39956" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530" }, { "name": "28665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28665" }, { "name": "20080125 Two vulnerabilities for PatchLink Update Client for Unix.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487103/100/0/threaded" }, { "name": "1019272", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019272" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PatchLink Update client for Unix, as used by Novell ZENworks Patch Management Update Agent for Linux/Unix/Mac (LUM) 6.2094 through 6.4102 and other products, allows local users to (1) truncate arbitrary files via a symlink attack on the /tmp/patchlink.tmp file used by the logtrimmer script, and (2) execute arbitrary code via a symlink attack on the /tmp/plshutdown file used by the rebootTask script." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527", "refsource": "CONFIRM", "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=527" }, { "name": "27458", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27458" }, { "name": "https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html", "refsource": "CONFIRM", "url": "https://secure-support.novell.com/KanisaPlatform/Publishing/18/3908994_f.SAL_Public.html" }, { "name": "ADV-2008-0426", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0426" }, { "name": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528", "refsource": "CONFIRM", "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=528" }, { "name": "3599", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3599" }, { "name": "patchlinkupdate-reboottask-symlink(39958)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39958" }, { "name": "28657", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28657" }, { "name": "patchlinkupdate-logtrimmer-symlink(39956)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39956" }, { "name": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530", "refsource": "CONFIRM", "url": "http://support.lumension.com/scripts/rightnow.cfg/php.exe/enduser/std_adp.php?p_faqid=530" }, { "name": "28665", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28665" }, { "name": "20080125 Two vulnerabilities for PatchLink Update Client for Unix.", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487103/100/0/threaded" }, { "name": "1019272", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019272" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0525", "datePublished": "2008-01-31T19:30:00", "dateReserved": "2008-01-31T00:00:00", "dateUpdated": "2024-08-07T07:46:54.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-4815 (GCVE-0-2008-4815)
Vulnerability from cvelistv5
Published
2008-11-05 14:51
Modified
2024-08-07 10:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:31:27.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32700", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32700" }, { "name": "32100", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32100" }, { "name": "adobe-acrobat-reader-priv-escalation(46335)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46335" }, { "name": "249366", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://download.oracle.com/sunalerts/1019937.1.html" }, { "name": "32872", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32872" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-19.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469882" }, { "name": "ADV-2009-0098", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0098" }, { "name": "TA08-309A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-309A.html" }, { "name": "1021140", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021140" }, { "name": "ADV-2008-3001", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3001" }, { "name": "SUSE-SR:2008:026", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html" }, { "name": "RHSA-2008:0974", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0974.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "32700", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32700" }, { "name": "32100", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32100" }, { "name": "adobe-acrobat-reader-priv-escalation(46335)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46335" }, { "name": "249366", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://download.oracle.com/sunalerts/1019937.1.html" }, { "name": "32872", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32872" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-19.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469882" }, { "name": "ADV-2009-0098", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0098" }, { "name": "TA08-309A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-309A.html" }, { "name": "1021140", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021140" }, { "name": "ADV-2008-3001", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3001" }, { "name": "SUSE-SR:2008:026", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html" }, { "name": "RHSA-2008:0974", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0974.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4815", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "32700", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32700" }, { "name": "32100", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32100" }, { "name": "adobe-acrobat-reader-priv-escalation(46335)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46335" }, { "name": "249366", "refsource": "SUNALERT", "url": "http://download.oracle.com/sunalerts/1019937.1.html" }, { "name": "32872", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32872" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb08-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb08-19.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=469882", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469882" }, { "name": "ADV-2009-0098", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0098" }, { "name": "TA08-309A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-309A.html" }, { "name": "1021140", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021140" }, { "name": "ADV-2008-3001", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3001" }, { "name": "SUSE-SR:2008:026", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html" }, { "name": "RHSA-2008:0974", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0974.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4815", "datePublished": "2008-11-05T14:51:00", "dateReserved": "2008-10-31T00:00:00", "dateUpdated": "2024-08-07T10:31:27.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1251 (GCVE-0-2009-1251)
Vulnerability from cvelistv5
Published
2009-04-09 00:00
Modified
2024-08-07 05:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:04:49.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0117", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0117" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openafs.org/security/OPENAFS-SA-2009-001.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openafs.org/security/openafs-sa-2009-001.patch" }, { "name": "ADV-2009-0984", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0984" }, { "name": "MDVSA-2009:099", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:099" }, { "name": "34407", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34407" }, { "name": "34655", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34655" }, { "name": "DSA-1768", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1768" }, { "name": "GLSA-201101-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201101-05.xml" }, { "name": "34684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34684" }, { "name": "42896", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42896" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-16T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2011-0117", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0117" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openafs.org/security/OPENAFS-SA-2009-001.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openafs.org/security/openafs-sa-2009-001.patch" }, { "name": "ADV-2009-0984", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0984" }, { "name": "MDVSA-2009:099", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:099" }, { "name": "34407", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34407" }, { "name": "34655", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34655" }, { "name": "DSA-1768", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1768" }, { "name": "GLSA-201101-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201101-05.xml" }, { "name": "34684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34684" }, { "name": "42896", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42896" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1251", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0117", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0117" }, { "name": "http://www.openafs.org/security/OPENAFS-SA-2009-001.txt", "refsource": "CONFIRM", "url": "http://www.openafs.org/security/OPENAFS-SA-2009-001.txt" }, { "name": "http://www.openafs.org/security/openafs-sa-2009-001.patch", "refsource": "CONFIRM", "url": "http://www.openafs.org/security/openafs-sa-2009-001.patch" }, { "name": "ADV-2009-0984", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0984" }, { "name": "MDVSA-2009:099", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:099" }, { "name": "34407", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34407" }, { "name": "34655", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34655" }, { "name": "DSA-1768", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1768" }, { "name": "GLSA-201101-05", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201101-05.xml" }, { "name": "34684", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34684" }, { "name": "42896", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42896" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1251", "datePublished": "2009-04-09T00:00:00", "dateReserved": "2009-04-06T00:00:00", "dateUpdated": "2024-08-07T05:04:49.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6045 (GCVE-0-2007-6045)
Vulnerability from cvelistv5
Published
2007-11-20 20:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in (1) DB2WATCH and (2) DB2FREEZE in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:26.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "IZ03655", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03655" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "41015", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41015" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27667" }, { "name": "41014", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41014" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in (1) DB2WATCH and (2) DB2FREEZE in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "IZ03655", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03655" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "41015", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41015" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27667" }, { "name": "41014", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41014" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in (1) DB2WATCH and (2) DB2FREEZE in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "IZ03655", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03655" }, { "name": "26450", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26450" }, { "name": "41015", "refsource": "OSVDB", "url": "http://osvdb.org/41015" }, { "name": "27667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27667" }, { "name": "41014", "refsource": "OSVDB", "url": "http://osvdb.org/41014" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6045", "datePublished": "2007-11-20T20:00:00", "dateReserved": "2007-11-20T00:00:00", "dateUpdated": "2024-08-07T15:54:26.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2661 (GCVE-0-2010-2661)
Vulnerability from cvelistv5
Published
2010-07-07 18:00
Modified
2024-08-07 02:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict access to the full pathname of a file selected for upload, which allows remote attackers to obtain potentially sensitive information via unspecified DOM manipulations.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-1673", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "name": "40973", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40973" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/support/search/view/960/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "name": "ADV-2010-1529", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "name": "40250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40250" }, { "name": "oval:org.mitre.oval:def:11669", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11669" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/windows/1054/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict access to the full pathname of a file selected for upload, which allows remote attackers to obtain potentially sensitive information via unspecified DOM manipulations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2010-1673", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "name": "40973", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40973" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/support/search/view/960/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "name": "ADV-2010-1529", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "name": "40250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40250" }, { "name": "oval:org.mitre.oval:def:11669", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11669" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/windows/1054/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2661", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict access to the full pathname of a file selected for upload, which allows remote attackers to obtain potentially sensitive information via unspecified DOM manipulations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-1673", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "name": "40973", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40973" }, { "name": "http://www.opera.com/support/search/view/960/", "refsource": "CONFIRM", "url": "http://www.opera.com/support/search/view/960/" }, { "name": "http://www.opera.com/docs/changelogs/unix/1060/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "name": "ADV-2010-1529", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "name": "http://www.opera.com/docs/changelogs/mac/1054/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "name": "40250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40250" }, { "name": "oval:org.mitre.oval:def:11669", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11669" }, { "name": "http://www.opera.com/docs/changelogs/windows/1054/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/windows/1054/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2661", "datePublished": "2010-07-07T18:00:00", "dateReserved": "2010-07-07T00:00:00", "dateUpdated": "2024-08-07T02:39:37.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2791 (GCVE-0-2010-2791)
Vulnerability from cvelistv5
Published
2010-08-05 18:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:47.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "apache-modproxy-info-disclsoure(60883)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60883" }, { "name": "RHSA-2010:0659", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0659.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html" }, { "name": "42102", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42102" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "[oss-security] 20100730 CVE-2010-2791: mod_proxy information leak affecting 2.2.9 only", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/07/30/1" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888222 - in /httpd/site/trunk/content/security/json: CVE-2010-2068.json CVE-2010-2791.json CVE-2011-0419.json CVE-2011-3368.json", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-30T00:00:00", "descriptions": [ { "lang": "en", "value": "mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:06:37", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "apache-modproxy-info-disclsoure(60883)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60883" }, { "name": "RHSA-2010:0659", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0659.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html" }, { "name": "42102", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42102" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "[oss-security] 20100730 CVE-2010-2791: mod_proxy information leak affecting 2.2.9 only", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/07/30/1" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888222 - in /httpd/site/trunk/content/security/json: CVE-2010-2068.json CVE-2010-2791.json CVE-2011-0419.json CVE-2011-3368.json", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-2791", "datePublished": "2010-08-05T18:00:00", "dateReserved": "2010-07-22T00:00:00", "dateUpdated": "2024-08-07T02:46:47.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3957 (GCVE-0-2009-3957)
Vulnerability from cvelistv5
Published
2010-01-13 19:00
Modified
2024-08-07 06:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "acrobat-reader-unspec-dos(55555)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55555" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "37760", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37760" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023446" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "name": "oval:org.mitre.oval:def:7975", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7975" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "acrobat-reader-unspec-dos(55555)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55555" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "37760", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37760" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023446" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "name": "oval:org.mitre.oval:def:7975", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7975" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3957", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "acrobat-reader-unspec-dos(55555)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55555" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "37760", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37760" }, { "name": "ADV-2010-0103", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023446" }, { "name": "SUSE-SA:2010:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "name": "oval:org.mitre.oval:def:7975", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7975" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3957", "datePublished": "2010-01-13T19:00:00", "dateReserved": "2009-11-16T00:00:00", "dateUpdated": "2024-08-07T06:45:50.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2594 (GCVE-0-2010-2594)
Vulnerability from cvelistv5
Published
2010-07-01 18:00
Modified
2024-09-16 22:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the web management interface in InterSect Alliance Snare Agent 3.2.3 and earlier on Solaris, Snare Agent 3.1.7 and earlier on Windows, Snare Agent 1.5.0 and earlier on Linux and AIX, Snare Agent 1.4 and earlier on IRIX, Snare Epilog 1.5.3 and earlier on Windows, and Snare Epilog 1.2 and earlier on UNIX allow remote attackers to hijack the authentication of administrators for requests that (1) change the password or (2) change the listening port.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:36.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://holisticinfosec.org/content/view/144/45/" }, { "name": "41226", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41226" }, { "name": "39562", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39562" }, { "name": "VU#173009", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/173009" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web management interface in InterSect Alliance Snare Agent 3.2.3 and earlier on Solaris, Snare Agent 3.1.7 and earlier on Windows, Snare Agent 1.5.0 and earlier on Linux and AIX, Snare Agent 1.4 and earlier on IRIX, Snare Epilog 1.5.3 and earlier on Windows, and Snare Epilog 1.2 and earlier on UNIX allow remote attackers to hijack the authentication of administrators for requests that (1) change the password or (2) change the listening port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-07-01T18:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://holisticinfosec.org/content/view/144/45/" }, { "name": "41226", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41226" }, { "name": "39562", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39562" }, { "name": "VU#173009", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/173009" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2594", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the web management interface in InterSect Alliance Snare Agent 3.2.3 and earlier on Solaris, Snare Agent 3.1.7 and earlier on Windows, Snare Agent 1.5.0 and earlier on Linux and AIX, Snare Agent 1.4 and earlier on IRIX, Snare Epilog 1.5.3 and earlier on Windows, and Snare Epilog 1.2 and earlier on UNIX allow remote attackers to hijack the authentication of administrators for requests that (1) change the password or (2) change the listening port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://holisticinfosec.org/content/view/144/45/", "refsource": "MISC", "url": "http://holisticinfosec.org/content/view/144/45/" }, { "name": "41226", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41226" }, { "name": "39562", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39562" }, { "name": "VU#173009", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/173009" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2594", "datePublished": "2010-07-01T18:00:00Z", "dateReserved": "2010-07-01T00:00:00Z", "dateUpdated": "2024-09-16T22:02:22.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3959 (GCVE-0-2009-3959)
Vulnerability from cvelistv5
Published
2010-01-13 19:00
Modified
2024-08-07 06:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "acrobat-reader-u3dsupport-code-exec(55557)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55557" }, { "name": "38138", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38138" }, { "name": "20100115 VUPEN Security Research - Adobe Acrobat and Reader U3D Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/508949" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "RHSA-2010:0060", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "name": "37756", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37756" }, { "name": "oval:org.mitre.oval:def:8539", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8539" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023446" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "name": "38215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38215" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "acrobat-reader-u3dsupport-code-exec(55557)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55557" }, { "name": "38138", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38138" }, { "name": "20100115 VUPEN Security Research - Adobe Acrobat and Reader U3D Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/508949" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "RHSA-2010:0060", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "name": "37756", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37756" }, { "name": "oval:org.mitre.oval:def:8539", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8539" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023446" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "name": "38215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38215" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3959", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "acrobat-reader-u3dsupport-code-exec(55557)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55557" }, { "name": "38138", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38138" }, { "name": "20100115 VUPEN Security Research - Adobe Acrobat and Reader U3D Integer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/508949" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "RHSA-2010:0060", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "name": "37756", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37756" }, { "name": "oval:org.mitre.oval:def:8539", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8539" }, { "name": "ADV-2010-0103", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023446" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=554293", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554293" }, { "name": "38215", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38215" }, { "name": "SUSE-SA:2010:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3959", "datePublished": "2010-01-13T19:00:00", "dateReserved": "2009-11-16T00:00:00", "dateUpdated": "2024-08-07T06:45:50.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6046 (GCVE-0-2007-6046)
Vulnerability from cvelistv5
Published
2007-11-20 20:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in unspecified setuid programs in IBM DB2 UDB 9.1 before Fixpak 4 allows local users to have an unknown impact.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:26.776Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27667" }, { "name": "IZ07018", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ07018" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in unspecified setuid programs in IBM DB2 UDB 9.1 before Fixpak 4 allows local users to have an unknown impact." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27667" }, { "name": "IZ07018", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ07018" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6046", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in unspecified setuid programs in IBM DB2 UDB 9.1 before Fixpak 4 allows local users to have an unknown impact." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26450" }, { "name": "27667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27667" }, { "name": "IZ07018", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ07018" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6046", "datePublished": "2007-11-20T20:00:00", "dateReserved": "2007-11-20T00:00:00", "dateUpdated": "2024-08-07T15:54:26.776Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6053 (GCVE-0-2007-6053)
Vulnerability from cvelistv5
Published
2007-11-20 20:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IBM DB2 UDB 9.1 before Fixpak 4 does not properly handle use of large numbers of file descriptors, which might allow attackers to have an unknown impact involving "memory corruption." NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:26.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "IZ04039", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ04039" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 9.1 before Fixpak 4 does not properly handle use of large numbers of file descriptors, which might allow attackers to have an unknown impact involving \"memory corruption.\" NOTE: the vendor description of this issue is too vague to be certain that it is security-related." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "IZ04039", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ04039" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26450" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM DB2 UDB 9.1 before Fixpak 4 does not properly handle use of large numbers of file descriptors, which might allow attackers to have an unknown impact involving \"memory corruption.\" NOTE: the vendor description of this issue is too vague to be certain that it is security-related." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "IZ04039", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ04039" }, { "name": "26450", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26450" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6053", "datePublished": "2007-11-20T20:00:00", "dateReserved": "2007-11-20T00:00:00", "dateUpdated": "2024-08-07T15:54:26.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6049 (GCVE-0-2007-6049)
Vulnerability from cvelistv5
Published
2007-11-20 20:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the SSL LOAD GSKIT action in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, involving a call to dlopen when the effective uid is root.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:26.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "41013", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41013" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "IZ05461", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ05461" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SSL LOAD GSKIT action in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, involving a call to dlopen when the effective uid is root." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "41013", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41013" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "IZ05461", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ05461" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the SSL LOAD GSKIT action in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, involving a call to dlopen when the effective uid is root." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "41013", "refsource": "OSVDB", "url": "http://osvdb.org/41013" }, { "name": "26450", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26450" }, { "name": "IZ05461", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ05461" }, { "name": "27667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27667" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6049", "datePublished": "2007-11-20T20:00:00", "dateReserved": "2007-11-20T00:00:00", "dateUpdated": "2024-08-07T15:54:26.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1292 (GCVE-0-2009-1292)
Vulnerability from cvelistv5
Published
2009-04-14 16:00
Modified
2024-08-07 05:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
UCM-CQ in IBM Rational ClearCase 7.0.0.x before 7.0.0.5, 7.0.1.x before 7.0.1.4, and 7.1.x before 7.1.0.1 on Linux and AIX places a username and password on the command line, which allows local users to obtain credentials by listing the process.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:04:49.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34483", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34483" }, { "name": "PK75832", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK75832" }, { "name": "34689", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34689" }, { "name": "clearcase-ucmcq-information-disclosure(49836)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49836" }, { "name": "ADV-2009-1017", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1017" }, { "name": "1022035", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022035" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "UCM-CQ in IBM Rational ClearCase 7.0.0.x before 7.0.0.5, 7.0.1.x before 7.0.1.4, and 7.1.x before 7.1.0.1 on Linux and AIX places a username and password on the command line, which allows local users to obtain credentials by listing the process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34483", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34483" }, { "name": "PK75832", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK75832" }, { "name": "34689", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34689" }, { "name": "clearcase-ucmcq-information-disclosure(49836)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49836" }, { "name": "ADV-2009-1017", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1017" }, { "name": "1022035", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022035" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1292", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "UCM-CQ in IBM Rational ClearCase 7.0.0.x before 7.0.0.5, 7.0.1.x before 7.0.1.4, and 7.1.x before 7.1.0.1 on Linux and AIX places a username and password on the command line, which allows local users to obtain credentials by listing the process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34483", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34483" }, { "name": "PK75832", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK75832" }, { "name": "34689", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34689" }, { "name": "clearcase-ucmcq-information-disclosure(49836)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49836" }, { "name": "ADV-2009-1017", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1017" }, { "name": "1022035", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022035" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1292", "datePublished": "2009-04-14T16:00:00", "dateReserved": "2009-04-14T00:00:00", "dateUpdated": "2024-08-07T05:04:49.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6050 (GCVE-0-2007-6050)
Vulnerability from cvelistv5
Published
2007-11-20 20:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in DB2LICD in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, related to creation of an "insecure directory."
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:26.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "IZ03881", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03881" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in DB2LICD in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, related to creation of an \"insecure directory.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "IZ03881", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03881" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26450" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in DB2LICD in IBM DB2 UDB 9.1 before Fixpak 4 has unknown impact and attack vectors, related to creation of an \"insecure directory.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "IZ03881", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03881" }, { "name": "ADV-2007-3867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26450" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6050", "datePublished": "2007-11-20T20:00:00", "dateReserved": "2007-11-20T00:00:00", "dateUpdated": "2024-08-07T15:54:26.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6047 (GCVE-0-2007-6047)
Vulnerability from cvelistv5
Published
2007-11-20 20:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the DB2DART tool in IBM DB2 UDB 9.1 before Fixpak 4 allows attackers to execute arbitrary commands as the DB2 instance owner, related to invocation of TPUT by DB2DART.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:26.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "IZ03646", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03646" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the DB2DART tool in IBM DB2 UDB 9.1 before Fixpak 4 allows attackers to execute arbitrary commands as the DB2 instance owner, related to invocation of TPUT by DB2DART." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "IZ03646", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03646" }, { "name": "27667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the DB2DART tool in IBM DB2 UDB 9.1 before Fixpak 4 allows attackers to execute arbitrary commands as the DB2 instance owner, related to invocation of TPUT by DB2DART." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26450" }, { "name": "IZ03646", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ03646" }, { "name": "27667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27667" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6047", "datePublished": "2007-11-20T20:00:00", "dateReserved": "2007-11-20T00:00:00", "dateUpdated": "2024-08-07T15:54:26.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2659 (GCVE-0-2010-2659)
Vulnerability from cvelistv5
Published
2010-07-07 18:00
Modified
2024-08-07 02:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Opera before 10.50 on Windows, before 10.52 on Mac OS X, and before 10.60 on UNIX platforms makes widget properties accessible to third-party domains, which allows remote attackers to obtain potentially sensitive information via a crafted web site.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.510Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-1673", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/windows/1050/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/mac/1052/" }, { "name": "oval:org.mitre.oval:def:11096", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11096" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/support/search/view/959/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/unix/1060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Opera before 10.50 on Windows, before 10.52 on Mac OS X, and before 10.60 on UNIX platforms makes widget properties accessible to third-party domains, which allows remote attackers to obtain potentially sensitive information via a crafted web site." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2010-1673", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/windows/1050/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/mac/1052/" }, { "name": "oval:org.mitre.oval:def:11096", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11096" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/support/search/view/959/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/unix/1060/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2659", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Opera before 10.50 on Windows, before 10.52 on Mac OS X, and before 10.60 on UNIX platforms makes widget properties accessible to third-party domains, which allows remote attackers to obtain potentially sensitive information via a crafted web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-1673", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "name": "http://www.opera.com/docs/changelogs/windows/1050/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/windows/1050/" }, { "name": "http://www.opera.com/docs/changelogs/mac/1052/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/mac/1052/" }, { "name": "oval:org.mitre.oval:def:11096", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11096" }, { "name": "http://www.opera.com/support/search/view/959/", "refsource": "CONFIRM", "url": "http://www.opera.com/support/search/view/959/" }, { "name": "http://www.opera.com/docs/changelogs/unix/1060/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1060/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2659", "datePublished": "2010-07-07T18:00:00", "dateReserved": "2010-07-07T00:00:00", "dateUpdated": "2024-08-07T02:39:37.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1454 (GCVE-0-2003-1454)
Vulnerability from cvelistv5
Published
2007-10-23 01:00
Modified
2024-08-08 02:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Invision Power Services Invision Board 1.0 through 1.1.1, when a forum is password protected, stores the administrator password in a cookie in plaintext, which could allow remote attackers to gain access.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.510Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "invision-admin-plaintext-password(11871)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11871" }, { "name": "7440", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7440" }, { "name": "20030425 Invision Power Board Plaintext Password Disclosure Vuln", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/319747" }, { "name": "3276", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3276" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Invision Power Services Invision Board 1.0 through 1.1.1, when a forum is password protected, stores the administrator password in a cookie in plaintext, which could allow remote attackers to gain access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "invision-admin-plaintext-password(11871)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11871" }, { "name": "7440", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7440" }, { "name": "20030425 Invision Power Board Plaintext Password Disclosure Vuln", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/319747" }, { "name": "3276", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3276" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1454", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Invision Power Services Invision Board 1.0 through 1.1.1, when a forum is password protected, stores the administrator password in a cookie in plaintext, which could allow remote attackers to gain access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "invision-admin-plaintext-password(11871)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11871" }, { "name": "7440", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7440" }, { "name": "20030425 Invision Power Board Plaintext Password Disclosure Vuln", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/319747" }, { "name": "3276", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3276" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1454", "datePublished": "2007-10-23T01:00:00", "dateReserved": "2007-10-22T00:00:00", "dateUpdated": "2024-08-08T02:28:03.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1931 (GCVE-0-2012-1931)
Vulnerability from cvelistv5
Published
2012-03-28 01:00
Modified
2024-08-06 19:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Opera before 11.62 on UNIX, when used in conjunction with an unspecified printing application, allows local users to overwrite arbitrary files via a symlink attack on a temporary file during printing.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/support/kb/view/1015/" }, { "name": "openSUSE-SU-2012:0610", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "name": "48535", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48535" }, { "name": "opera-printing-symlink(74500)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74500" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Opera before 11.62 on UNIX, when used in conjunction with an unspecified printing application, allows local users to overwrite arbitrary files via a symlink attack on a temporary file during printing." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/support/kb/view/1015/" }, { "name": "openSUSE-SU-2012:0610", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "name": "48535", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48535" }, { "name": "opera-printing-symlink(74500)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74500" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-1931", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Opera before 11.62 on UNIX, when used in conjunction with an unspecified printing application, allows local users to overwrite arbitrary files via a symlink attack on a temporary file during printing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.opera.com/support/kb/view/1015/", "refsource": "CONFIRM", "url": "http://www.opera.com/support/kb/view/1015/" }, { "name": "openSUSE-SU-2012:0610", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "name": "http://www.opera.com/docs/changelogs/unix/1162/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "name": "48535", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48535" }, { "name": "opera-printing-symlink(74500)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74500" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-1931", "datePublished": "2012-03-28T01:00:00", "dateReserved": "2012-03-27T00:00:00", "dateUpdated": "2024-08-06T19:17:27.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3958 (GCVE-0-2009-3958)
Vulnerability from cvelistv5
Published
2010-01-13 19:00
Modified
2024-08-07 06:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow remote attackers to execute arbitrary code via unspecified initialization parameters.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:8455", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8455" }, { "name": "37759", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37759" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023446" }, { "name": "acrobat-reader-download-manager-bo(55556)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55556" }, { "name": "VU#773545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/773545" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow remote attackers to execute arbitrary code via unspecified initialization parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "oval:org.mitre.oval:def:8455", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8455" }, { "name": "37759", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37759" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023446" }, { "name": "acrobat-reader-download-manager-bo(55556)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55556" }, { "name": "VU#773545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/773545" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3958", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow remote attackers to execute arbitrary code via unspecified initialization parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:8455", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8455" }, { "name": "37759", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37759" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "ADV-2010-0103", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023446" }, { "name": "acrobat-reader-download-manager-bo(55556)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55556" }, { "name": "VU#773545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/773545" }, { "name": "SUSE-SA:2010:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3958", "datePublished": "2010-01-13T19:00:00", "dateReserved": "2009-11-16T00:00:00", "dateUpdated": "2024-08-07T06:45:50.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1467 (GCVE-0-2003-1467)
Vulnerability from cvelistv5
Published
2007-10-24 23:00
Modified
2024-08-08 02:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) login.php, (2) register.php, (3) post.php, and (4) common.php in Phorum before 3.4.3 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.488Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "7572", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7572" }, { "name": "7576", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7576" }, { "name": "7573", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7573" }, { "name": "3288", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3288" }, { "name": "phorum-register-html-injection(12502)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12502" }, { "name": "7577", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7577" }, { "name": "7584", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7584" }, { "name": "phorum-multiple-xss(12487)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12487" }, { "name": "20030513 Phorum Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/321310" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) login.php, (2) register.php, (3) post.php, and (4) common.php in Phorum before 3.4.3 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "7572", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7572" }, { "name": "7576", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7576" }, { "name": "7573", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7573" }, { "name": "3288", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3288" }, { "name": "phorum-register-html-injection(12502)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12502" }, { "name": "7577", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7577" }, { "name": "7584", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7584" }, { "name": "phorum-multiple-xss(12487)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12487" }, { "name": "20030513 Phorum Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/321310" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1467", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) login.php, (2) register.php, (3) post.php, and (4) common.php in Phorum before 3.4.3 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "7572", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7572" }, { "name": "7576", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7576" }, { "name": "7573", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7573" }, { "name": "3288", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3288" }, { "name": "phorum-register-html-injection(12502)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12502" }, { "name": "7577", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7577" }, { "name": "7584", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7584" }, { "name": "phorum-multiple-xss(12487)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12487" }, { "name": "20030513 Phorum Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/321310" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1467", "datePublished": "2007-10-24T23:00:00", "dateReserved": "2007-10-24T00:00:00", "dateUpdated": "2024-08-08T02:28:03.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1456 (GCVE-0-2003-1456)
Vulnerability from cvelistv5
Published
2007-10-23 01:00
Modified
2024-08-08 02:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Album.pl 6.1 allows remote attackers to execute arbitrary commands, when an alternative configuration file is used, via unknown attack vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://perl.bobbitt.ca/yabbse/index.php?board=2%3Baction=display%3Bthreadid=720" }, { "name": "3270", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3270" }, { "name": "albumpl-command-execution(11878)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11878" }, { "name": "20030426 Album.pl Vulnerability - Remote Command Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/319763" }, { "name": "7444", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7444" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-04-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Album.pl 6.1 allows remote attackers to execute arbitrary commands, when an alternative configuration file is used, via unknown attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://perl.bobbitt.ca/yabbse/index.php?board=2%3Baction=display%3Bthreadid=720" }, { "name": "3270", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3270" }, { "name": "albumpl-command-execution(11878)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11878" }, { "name": "20030426 Album.pl Vulnerability - Remote Command Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/319763" }, { "name": "7444", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7444" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Album.pl 6.1 allows remote attackers to execute arbitrary commands, when an alternative configuration file is used, via unknown attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://perl.bobbitt.ca/yabbse/index.php?board=2;action=display;threadid=720", "refsource": "CONFIRM", "url": "http://perl.bobbitt.ca/yabbse/index.php?board=2;action=display;threadid=720" }, { "name": "3270", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3270" }, { "name": "albumpl-command-execution(11878)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11878" }, { "name": "20030426 Album.pl Vulnerability - Remote Command Execution", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/319763" }, { "name": "7444", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7444" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1456", "datePublished": "2007-10-23T01:00:00", "dateReserved": "2007-10-22T00:00:00", "dateUpdated": "2024-08-08T02:28:03.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-3073 (GCVE-0-2007-3073)
Vulnerability from cvelistv5
Published
2007-06-06 10:00
Modified
2024-08-07 14:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:05:28.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20070604 Unpatched input validation flaw in Firefox 2.0.0.4", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/470500/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://larholm.com/2007/05/25/firefox-0day-local-file-reading/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=367428" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=380994" }, { "name": "25481", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25481" }, { "name": "35920", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35920" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20070604 Unpatched input validation flaw in Firefox 2.0.0.4", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/470500/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://larholm.com/2007/05/25/firefox-0day-local-file-reading/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=367428" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=380994" }, { "name": "25481", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25481" }, { "name": "35920", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35920" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20070604 Unpatched input validation flaw in Firefox 2.0.0.4", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/470500/100/0/threaded" }, { "name": "http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/", "refsource": "MISC", "url": "http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/" }, { "name": "http://larholm.com/2007/05/25/firefox-0day-local-file-reading/", "refsource": "MISC", "url": "http://larholm.com/2007/05/25/firefox-0day-local-file-reading/" }, { "name": "http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/", "refsource": "MISC", "url": "http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=367428", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=367428" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=380994", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=380994" }, { "name": "25481", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25481" }, { "name": "35920", "refsource": "OSVDB", "url": "http://osvdb.org/35920" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3073", "datePublished": "2007-06-06T10:00:00", "dateReserved": "2007-06-05T00:00:00", "dateUpdated": "2024-08-07T14:05:28.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2203 (GCVE-0-2010-2203)
Vulnerability from cvelistv5
Published
2010-06-30 18:00
Modified
2024-08-07 02:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:25:07.243Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-1636", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "name": "oval:org.mitre.oval:def:14495", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14495" }, { "name": "41235", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41235" }, { "name": "1024159", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024159" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-06-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "ADV-2010-1636", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "name": "oval:org.mitre.oval:def:14495", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14495" }, { "name": "41235", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41235" }, { "name": "1024159", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024159" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2203", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-1636", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "name": "oval:org.mitre.oval:def:14495", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14495" }, { "name": "41235", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41235" }, { "name": "1024159", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024159" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2203", "datePublished": "2010-06-30T18:00:00", "dateReserved": "2010-06-08T00:00:00", "dateUpdated": "2024-08-07T02:25:07.243Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-1228 (GCVE-0-2007-1228)
Vulnerability from cvelistv5
Published
2007-03-02 22:00
Modified
2024-08-07 12:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IBM DB2 UDB 8.2 before Fixpak 7 (aka fixpack 14), and DB2 9 before Fix Pack 2, on UNIX allows the "fenced" user to access certain unauthorized directories.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:50:34.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "IY87492", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY87492" }, { "name": "24387", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24387" }, { "name": "IY86711", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY86711" }, { "name": "1017731", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017731" }, { "name": "22729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22729" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 8.2 before Fixpak 7 (aka fixpack 14), and DB2 9 before Fix Pack 2, on UNIX allows the \"fenced\" user to access certain unauthorized directories." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-03-14T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "IY87492", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY87492" }, { "name": "24387", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24387" }, { "name": "IY86711", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY86711" }, { "name": "1017731", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017731" }, { "name": "22729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22729" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1228", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM DB2 UDB 8.2 before Fixpak 7 (aka fixpack 14), and DB2 9 before Fix Pack 2, on UNIX allows the \"fenced\" user to access certain unauthorized directories." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "IY87492", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY87492" }, { "name": "24387", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24387" }, { "name": "IY86711", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY86711" }, { "name": "1017731", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017731" }, { "name": "22729", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22729" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1228", "datePublished": "2007-03-02T22:00:00", "dateReserved": "2007-03-02T00:00:00", "dateUpdated": "2024-08-07T12:50:34.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-6472 (GCVE-0-2012-6472)
Vulnerability from cvelistv5
Published
2013-01-02 11:00
Modified
2024-09-16 19:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Opera before 12.12 on UNIX uses weak permissions for the profile directory, which allows local users to obtain sensitive information by reading a (1) cache file, (2) password file, or (3) configuration file, or (4) possibly gain privileges by modifying or overwriting a configuration file.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.822Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/unified/1212/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/support/kb/view/1039/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Opera before 12.12 on UNIX uses weak permissions for the profile directory, which allows local users to obtain sensitive information by reading a (1) cache file, (2) password file, or (3) configuration file, or (4) possibly gain privileges by modifying or overwriting a configuration file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-01-02T11:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/unified/1212/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/support/kb/view/1039/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Opera before 12.12 on UNIX uses weak permissions for the profile directory, which allows local users to obtain sensitive information by reading a (1) cache file, (2) password file, or (3) configuration file, or (4) possibly gain privileges by modifying or overwriting a configuration file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.opera.com/docs/changelogs/unified/1212/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unified/1212/" }, { "name": "http://www.opera.com/support/kb/view/1039/", "refsource": "CONFIRM", "url": "http://www.opera.com/support/kb/view/1039/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6472", "datePublished": "2013-01-02T11:00:00Z", "dateReserved": "2013-01-02T00:00:00Z", "dateUpdated": "2024-09-16T19:36:47.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6052 (GCVE-0-2007-6052)
Vulnerability from cvelistv5
Published
2007-11-20 20:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IBM DB2 UDB 9.1 before Fixpak 4 does not properly perform vector aggregation, which might allow attackers to cause a denial of service (divide-by-zero error and DBMS crash), related to an "overflow." NOTE: the vendor description of this issue is too vague to be certain that it is security-related.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:26.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "IZ08205", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ08205" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM DB2 UDB 9.1 before Fixpak 4 does not properly perform vector aggregation, which might allow attackers to cause a denial of service (divide-by-zero error and DBMS crash), related to an \"overflow.\" NOTE: the vendor description of this issue is too vague to be certain that it is security-related." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26450" }, { "name": "IZ08205", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ08205" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM DB2 UDB 9.1 before Fixpak 4 does not properly perform vector aggregation, which might allow attackers to cause a denial of service (divide-by-zero error and DBMS crash), related to an \"overflow.\" NOTE: the vendor description of this issue is too vague to be certain that it is security-related." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" }, { "name": "ADV-2007-3867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3867" }, { "name": "26450", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26450" }, { "name": "IZ08205", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ08205" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6052", "datePublished": "2007-11-20T20:00:00", "dateReserved": "2007-11-20T00:00:00", "dateUpdated": "2024-08-07T15:54:26.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1372 (GCVE-0-2003-1372)
Vulnerability from cvelistv5
Published
2007-10-17 01:00
Modified
2024-08-08 02:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in links.php script in myPHPNuke 1.8.8, and possibly earlier versions, allows remote attackers to inject arbitrary HTML and web script via the (1) ratenum or (2) query parameters.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:02.844Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "phpbb-index-sql-injection(11376)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11376" }, { "name": "8125", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/8125" }, { "name": "6892", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6892" }, { "name": "3931", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3931" }, { "name": "20030219 myphpnuke xss", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-02/0231.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in links.php script in myPHPNuke 1.8.8, and possibly earlier versions, allows remote attackers to inject arbitrary HTML and web script via the (1) ratenum or (2) query parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "phpbb-index-sql-injection(11376)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11376" }, { "name": "8125", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/8125" }, { "name": "6892", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6892" }, { "name": "3931", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3931" }, { "name": "20030219 myphpnuke xss", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-02/0231.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1372", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in links.php script in myPHPNuke 1.8.8, and possibly earlier versions, allows remote attackers to inject arbitrary HTML and web script via the (1) ratenum or (2) query parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "phpbb-index-sql-injection(11376)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11376" }, { "name": "8125", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8125" }, { "name": "6892", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6892" }, { "name": "3931", "refsource": "OSVDB", "url": "http://www.osvdb.org/3931" }, { "name": "20030219 myphpnuke xss", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2003-02/0231.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1372", "datePublished": "2007-10-17T01:00:00", "dateReserved": "2007-10-16T00:00:00", "dateUpdated": "2024-08-08T02:28:02.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2166 (GCVE-0-2009-2166)
Vulnerability from cvelistv5
Published
2009-06-22 20:00
Modified
2024-08-07 05:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Absolute path traversal vulnerability in cvs.php in OCS Inventory NG before 1.02.1 on Unix allows remote attackers to read arbitrary files via a full pathname in the log parameter.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.157Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8868", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/8868" }, { "name": "20090602 OCS Inventory NG 1.02 - Directory Traversal", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/504047/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.leidecker.info/advisories/2009-05-30-ocs_inventory_ng_directory_traversal.shtml" }, { "name": "ocsinventory-cvs-info-disclosure(50946)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50946" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in cvs.php in OCS Inventory NG before 1.02.1 on Unix allows remote attackers to read arbitrary files via a full pathname in the log parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "8868", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/8868" }, { "name": "20090602 OCS Inventory NG 1.02 - Directory Traversal", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/504047/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.leidecker.info/advisories/2009-05-30-ocs_inventory_ng_directory_traversal.shtml" }, { "name": "ocsinventory-cvs-info-disclosure(50946)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50946" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2166", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Absolute path traversal vulnerability in cvs.php in OCS Inventory NG before 1.02.1 on Unix allows remote attackers to read arbitrary files via a full pathname in the log parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8868", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/8868" }, { "name": "20090602 OCS Inventory NG 1.02 - Directory Traversal", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/504047/100/0/threaded" }, { "name": "http://www.leidecker.info/advisories/2009-05-30-ocs_inventory_ng_directory_traversal.shtml", "refsource": "MISC", "url": "http://www.leidecker.info/advisories/2009-05-30-ocs_inventory_ng_directory_traversal.shtml" }, { "name": "ocsinventory-cvs-info-disclosure(50946)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50946" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2166", "datePublished": "2009-06-22T20:00:00", "dateReserved": "2009-06-22T00:00:00", "dateUpdated": "2024-08-07T05:44:55.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-1999-0377 (GCVE-0-1999-0377)
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Process table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine's process tables through multiple connections to network services.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:34:51.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1033881", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Process table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine\u0027s process tables through multiple connections to network services." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1033881", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0377", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Process table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine\u0027s process tables through multiple connections to network services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1033881", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033881" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0377", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:34:51.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1930 (GCVE-0-2012-1930)
Vulnerability from cvelistv5
Published
2012-03-28 01:00
Modified
2024-08-06 19:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Opera before 11.62 on UNIX uses world-readable permissions for temporary files during printing, which allows local users to obtain sensitive information by reading these files.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.021Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "opera-printing-info-disclosure(74501)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74501" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/support/kb/view/1015/" }, { "name": "openSUSE-SU-2012:0610", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "name": "48535", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48535" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Opera before 11.62 on UNIX uses world-readable permissions for temporary files during printing, which allows local users to obtain sensitive information by reading these files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "opera-printing-info-disclosure(74501)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74501" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/support/kb/view/1015/" }, { "name": "openSUSE-SU-2012:0610", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "name": "48535", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48535" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-1930", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Opera before 11.62 on UNIX uses world-readable permissions for temporary files during printing, which allows local users to obtain sensitive information by reading these files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "opera-printing-info-disclosure(74501)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74501" }, { "name": "http://www.opera.com/support/kb/view/1015/", "refsource": "CONFIRM", "url": "http://www.opera.com/support/kb/view/1015/" }, { "name": "openSUSE-SU-2012:0610", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html" }, { "name": "http://www.opera.com/docs/changelogs/unix/1162/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1162/" }, { "name": "48535", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48535" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-1930", "datePublished": "2012-03-28T01:00:00", "dateReserved": "2012-03-27T00:00:00", "dateUpdated": "2024-08-06T19:17:27.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2665 (GCVE-0-2010-2665)
Vulnerability from cvelistv5
Published
2010-07-07 18:00
Modified
2024-08-07 02:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Opera before 10.54 on Windows and Mac OS X, and before 10.11 on UNIX platforms, allows remote attackers to inject arbitrary web script or HTML via a data: URI, related to incorrect detection of the "opening site."
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.641Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "opera-datauri-xss(60646)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60646" }, { "name": "40973", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40973" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/unix/1011/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/support/kb/view/955/" }, { "name": "ADV-2010-1529", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "name": "oval:org.mitre.oval:def:11362", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11362" }, { "name": "40250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/windows/1054/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Opera before 10.54 on Windows and Mac OS X, and before 10.11 on UNIX platforms, allows remote attackers to inject arbitrary web script or HTML via a data: URI, related to incorrect detection of the \"opening site.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "opera-datauri-xss(60646)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60646" }, { "name": "40973", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40973" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/unix/1011/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/support/kb/view/955/" }, { "name": "ADV-2010-1529", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "name": "oval:org.mitre.oval:def:11362", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11362" }, { "name": "40250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/windows/1054/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2665", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Opera before 10.54 on Windows and Mac OS X, and before 10.11 on UNIX platforms, allows remote attackers to inject arbitrary web script or HTML via a data: URI, related to incorrect detection of the \"opening site.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "opera-datauri-xss(60646)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60646" }, { "name": "40973", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40973" }, { "name": "http://www.opera.com/docs/changelogs/unix/1011/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1011/" }, { "name": "http://www.opera.com/support/kb/view/955/", "refsource": "CONFIRM", "url": "http://www.opera.com/support/kb/view/955/" }, { "name": "ADV-2010-1529", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "name": "http://www.opera.com/docs/changelogs/mac/1054/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "name": "oval:org.mitre.oval:def:11362", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11362" }, { "name": "40250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40250" }, { "name": "http://www.opera.com/docs/changelogs/windows/1054/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/windows/1054/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2665", "datePublished": "2010-07-07T18:00:00", "dateReserved": "2010-07-07T00:00:00", "dateUpdated": "2024-08-07T02:39:37.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4369 (GCVE-0-2011-4369)
Vulnerability from cvelistv5
Published
2011-12-16 19:00
Modified
2024-08-07 00:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2012:0087", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-01.html" }, { "name": "RHSA-2012:0011", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2012-0011.html" }, { "name": "SUSE-SU-2012:0086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-30.html" }, { "name": "oval:org.mitre.oval:def:14865", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14865" }, { "name": "TA11-350A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-350A.html" }, { "name": "51092", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51092" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2012:0087", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-01.html" }, { "name": "RHSA-2012:0011", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2012-0011.html" }, { "name": "SUSE-SU-2012:0086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-30.html" }, { "name": "oval:org.mitre.oval:def:14865", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14865" }, { "name": "TA11-350A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-350A.html" }, { "name": "51092", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51092" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-4369", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2012:0087", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-01.html" }, { "name": "RHSA-2012:0011", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2012-0011.html" }, { "name": "SUSE-SU-2012:0086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-30.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-30.html" }, { "name": "oval:org.mitre.oval:def:14865", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14865" }, { "name": "TA11-350A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-350A.html" }, { "name": "51092", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51092" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-4369", "datePublished": "2011-12-16T19:00:00", "dateReserved": "2011-11-04T00:00:00", "dateUpdated": "2024-08-07T00:09:18.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3956 (GCVE-0-2009-3956)
Vulnerability from cvelistv5
Published
2010-01-13 19:00
Modified
2024-08-07 06:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "acrobat-reader-unspec-xss(55554)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55554" }, { "name": "38138", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38138" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "RHSA-2010:0060", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "name": "37763", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37763" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.stratsec.net/files/SS-2010-001_Stratsec_Acrobat_Script_Injection_Security_Advisory_v1.0.pdf" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023446" }, { "name": "38215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38215" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "name": "oval:org.mitre.oval:def:8327", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8327" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.packetstormsecurity.org/1001-exploits/SS-2010-001.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a \"script injection vulnerability,\" as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "acrobat-reader-unspec-xss(55554)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55554" }, { "name": "38138", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38138" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "RHSA-2010:0060", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "name": "37763", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37763" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.stratsec.net/files/SS-2010-001_Stratsec_Acrobat_Script_Injection_Security_Advisory_v1.0.pdf" }, { "name": "ADV-2010-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023446" }, { "name": "38215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38215" }, { "name": "SUSE-SA:2010:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "name": "oval:org.mitre.oval:def:8327", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8327" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.packetstormsecurity.org/1001-exploits/SS-2010-001.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3956", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a \"script injection vulnerability,\" as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "acrobat-reader-unspec-xss(55554)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55554" }, { "name": "38138", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38138" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=554296", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554296" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "name": "RHSA-2010:0060", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0060.html" }, { "name": "37763", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37763" }, { "name": "http://www.stratsec.net/files/SS-2010-001_Stratsec_Acrobat_Script_Injection_Security_Advisory_v1.0.pdf", "refsource": "MISC", "url": "http://www.stratsec.net/files/SS-2010-001_Stratsec_Acrobat_Script_Injection_Security_Advisory_v1.0.pdf" }, { "name": "ADV-2010-0103", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0103" }, { "name": "1023446", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023446" }, { "name": "38215", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38215" }, { "name": "SUSE-SA:2010:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" }, { "name": "TA10-013A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-013A.html" }, { "name": "oval:org.mitre.oval:def:8327", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8327" }, { "name": "http://www.packetstormsecurity.org/1001-exploits/SS-2010-001.txt", "refsource": "MISC", "url": "http://www.packetstormsecurity.org/1001-exploits/SS-2010-001.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3956", "datePublished": "2010-01-13T19:00:00", "dateReserved": "2009-11-16T00:00:00", "dateUpdated": "2024-08-07T06:45:50.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1423 (GCVE-0-2003-1423)
Vulnerability from cvelistv5
Published
2007-10-20 10:00
Modified
2024-08-08 02:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Petitforum stores the liste.txt data file under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as e-mail addresses and encrypted passwords.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "petitforum-liste-info-disclosure(11358)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11358" }, { "name": "1006117", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1006117" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-02-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Petitforum stores the liste.txt data file under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as e-mail addresses and encrypted passwords." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "petitforum-liste-info-disclosure(11358)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11358" }, { "name": "1006117", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1006117" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1423", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Petitforum stores the liste.txt data file under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as e-mail addresses and encrypted passwords." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "petitforum-liste-info-disclosure(11358)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11358" }, { "name": "1006117", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1006117" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1423", "datePublished": "2007-10-20T10:00:00", "dateReserved": "2007-10-19T00:00:00", "dateUpdated": "2024-08-08T02:28:03.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6305 (GCVE-0-2007-6305)
Vulnerability from cvelistv5
Published
2007-12-10 21:00
Modified
2024-08-07 16:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 7 R3.2.0 allow attackers to gain privileges via "some HMC commands."
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:02:36.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power6/install/v7.Readme.html#MH01065" }, { "name": "1019062", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019062" }, { "name": "27961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27961" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4038" }, { "name": "MB02226", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1MB02226" }, { "name": "ADV-2007-4144", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4144" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 7 R3.2.0 allow attackers to gain privileges via \"some HMC commands.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-12-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power6/install/v7.Readme.html#MH01065" }, { "name": "1019062", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019062" }, { "name": "27961", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27961" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4038" }, { "name": "MB02226", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1MB02226" }, { "name": "ADV-2007-4144", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4144" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6305", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in IBM Hardware Management Console (HMC) 7 R3.2.0 allow attackers to gain privileges via \"some HMC commands.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power6/install/v7.Readme.html#MH01065", "refsource": "CONFIRM", "url": "https://www14.software.ibm.com/webapp/set2/sas/f/hmc/power6/install/v7.Readme.html#MH01065" }, { "name": "1019062", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019062" }, { "name": "27961", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27961" }, { "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4038", "refsource": "CONFIRM", "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4038" }, { "name": "MB02226", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1MB02226" }, { "name": "ADV-2007-4144", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4144" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6305", "datePublished": "2007-12-10T21:00:00", "dateReserved": "2007-12-10T00:00:00", "dateUpdated": "2024-08-07T16:02:36.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2660 (GCVE-0-2010-2660)
Vulnerability from cvelistv5
Published
2010-07-07 18:00
Modified
2024-08-07 02:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict certain uses of homograph characters in domain names, which makes it easier for remote attackers to spoof IDN domains via unspecified choices of characters.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-1673", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "name": "oval:org.mitre.oval:def:11603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11603" }, { "name": "40973", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40973" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "name": "ADV-2010-1529", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "name": "40250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/support/search/view/961/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/windows/1054/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict certain uses of homograph characters in domain names, which makes it easier for remote attackers to spoof IDN domains via unspecified choices of characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2010-1673", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "name": "oval:org.mitre.oval:def:11603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11603" }, { "name": "40973", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40973" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "name": "ADV-2010-1529", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "name": "40250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/support/search/view/961/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/windows/1054/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2660", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Opera before 10.54 on Windows and Mac OS X, and before 10.60 on UNIX platforms, does not properly restrict certain uses of homograph characters in domain names, which makes it easier for remote attackers to spoof IDN domains via unspecified choices of characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-1673", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1673" }, { "name": "oval:org.mitre.oval:def:11603", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11603" }, { "name": "40973", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40973" }, { "name": "http://www.opera.com/docs/changelogs/unix/1060/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1060/" }, { "name": "ADV-2010-1529", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1529" }, { "name": "http://www.opera.com/docs/changelogs/mac/1054/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/mac/1054/" }, { "name": "40250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40250" }, { "name": "http://www.opera.com/support/search/view/961/", "refsource": "CONFIRM", "url": "http://www.opera.com/support/search/view/961/" }, { "name": "http://www.opera.com/docs/changelogs/windows/1054/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/windows/1054/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2660", "datePublished": "2010-07-07T18:00:00", "dateReserved": "2010-07-07T00:00:00", "dateUpdated": "2024-08-07T02:39:37.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-7164 (GCVE-0-2006-7164)
Vulnerability from cvelistv5
Published
2007-03-20 10:00
Modified
2024-09-16 22:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SimpleFileServlet in IBM WebSphere Application Server 5.0.1 through 5.0.2.7 on Linux and UNIX does not block certain invalid URIs and does not issue a security challenge, which allows remote attackers to read secure files and obtain sensitive information via certain requests.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:40.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "PQ91033", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SimpleFileServlet in IBM WebSphere Application Server 5.0.1 through 5.0.2.7 on Linux and UNIX does not block certain invalid URIs and does not issue a security challenge, which allows remote attackers to read secure files and obtain sensitive information via certain requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-03-20T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "PQ91033", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013029" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-7164", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SimpleFileServlet in IBM WebSphere Application Server 5.0.1 through 5.0.2.7 on Linux and UNIX does not block certain invalid URIs and does not issue a security challenge, which allows remote attackers to read secure files and obtain sensitive information via certain requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "PQ91033", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013029" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-7164", "datePublished": "2007-03-20T10:00:00Z", "dateReserved": "2007-03-20T00:00:00Z", "dateUpdated": "2024-09-16T22:56:50.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }