Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-1251 (GCVE-0-2012-1251)
Vulnerability from cvelistv5 – Published: 2012-06-04 17:00 – Updated: 2024-09-16 19:40
VLAI?
EPSS
Summary
Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:53:36.401Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/mac/963/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/windows/963/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/unix/963/"
},
{
"name": "JVN#39707339",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN39707339/index.html"
},
{
"name": "JVNDB-2012-000049",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000049"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-06-04T17:00:00.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.opera.com/docs/changelogs/mac/963/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.opera.com/docs/changelogs/windows/963/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.opera.com/docs/changelogs/unix/963/"
},
{
"name": "JVN#39707339",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN39707339/index.html"
},
{
"name": "JVNDB-2012-000049",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000049"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-1251",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opera.com/docs/changelogs/mac/963/",
"refsource": "MISC",
"url": "http://www.opera.com/docs/changelogs/mac/963/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/963/",
"refsource": "MISC",
"url": "http://www.opera.com/docs/changelogs/windows/963/"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/963/",
"refsource": "MISC",
"url": "http://www.opera.com/docs/changelogs/unix/963/"
},
{
"name": "JVN#39707339",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN39707339/index.html"
},
{
"name": "JVNDB-2012-000049",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000049"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-1251",
"datePublished": "2012-06-04T17:00:00.000Z",
"dateReserved": "2012-02-21T00:00:00.000Z",
"dateUpdated": "2024-09-16T19:40:36.433Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GSD-2012-1251
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2012-1251",
"description": "Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.",
"id": "GSD-2012-1251"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-1251"
],
"details": "Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.",
"id": "GSD-2012-1251",
"modified": "2023-12-13T01:20:18.764433Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-1251",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opera.com/docs/changelogs/mac/963/",
"refsource": "MISC",
"url": "http://www.opera.com/docs/changelogs/mac/963/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/963/",
"refsource": "MISC",
"url": "http://www.opera.com/docs/changelogs/windows/963/"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/963/",
"refsource": "MISC",
"url": "http://www.opera.com/docs/changelogs/unix/963/"
},
{
"name": "JVN#39707339",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN39707339/index.html"
},
{
"name": "JVNDB-2012-000049",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000049"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "9.62",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-1251"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2012-000049",
"refsource": "JVNDB",
"tags": [],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000049"
},
{
"name": "JVN#39707339",
"refsource": "JVN",
"tags": [],
"url": "http://jvn.jp/en/jp/JVN39707339/index.html"
},
{
"name": "http://www.opera.com/docs/changelogs/mac/963/",
"refsource": "MISC",
"tags": [],
"url": "http://www.opera.com/docs/changelogs/mac/963/"
},
{
"name": "http://www.opera.com/docs/changelogs/unix/963/",
"refsource": "MISC",
"tags": [],
"url": "http://www.opera.com/docs/changelogs/unix/963/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/963/",
"refsource": "MISC",
"tags": [],
"url": "http://www.opera.com/docs/changelogs/windows/963/"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2014-03-05T19:12Z",
"publishedDate": "2012-06-04T17:55Z"
}
}
}
JVNDB-2012-000049
Vulnerability from jvndb - Published: 2012-05-25 15:40 - Updated:2012-07-26 17:31Summary
Opera fails to verify SSL server certificates
Details
Opera contains an issue where it fails to verify SSL server certificates.
Opera is a web browser. Opera contains an issue where it fails to verify SSL server certificates.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000049.html",
"dc:date": "2012-07-26T17:31+09:00",
"dcterms:issued": "2012-05-25T15:40+09:00",
"dcterms:modified": "2012-07-26T17:31+09:00",
"description": "Opera contains an issue where it fails to verify SSL server certificates.\r\n\r\nOpera is a web browser. Opera contains an issue where it fails to verify SSL server certificates.",
"link": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000049.html",
"sec:cpe": {
"#text": "cpe:/a:opera:opera_browser",
"@product": "Opera",
"@vendor": "Opera Software ASA",
"@version": "2.2"
},
"sec:cvss": {
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2012-000049",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN39707339/index.html",
"@id": "JVN#39707339",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1251",
"@id": "CVE-2012-1251",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1251",
"@id": "CVE-2012-1251",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "Opera fails to verify SSL server certificates"
}
FKIE_CVE-2012-1251
Vulnerability from fkie_nvd - Published: 2012-06-04 17:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D239D60E-36F5-4301-AAC7-6F6D928093B0",
"versionEndIncluding": "9.62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "0F892EEF-54EC-4EC0-84B3-BD5C216AED80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "089BEFE3-24B2-4C73-BA25-7C905ED68A50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3B73E6B0-2113-4D09-A665-7D8FEC3A3D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*",
"matchCriteriaId": "76AECDD0-C14D-4A68-AF2E-1C41A51089EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*",
"matchCriteriaId": "1C06EBBF-8B64-4C22-9EDA-E133AFD205DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*",
"matchCriteriaId": "D888C22C-41F9-427D-9249-F010891DA48E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "326AE3EE-3BF3-4B7E-B3FC-445FB9D6E4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*",
"matchCriteriaId": "94FAD06C-830A-4CB6-B9AF-7E093B64B69B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*",
"matchCriteriaId": "C9BDFBD0-3CAC-4617-B1B2-7F95E7C648D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5366D587-7E77-4288-AB31-48108D04E0B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "60EFFC44-A329-4FA5-B57C-FA8892F8226B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*",
"matchCriteriaId": "9241CFD0-9E61-487F-B076-2D7B8ACEA381",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "ACEE8213-BD3A-405B-BC4C-8B80EBDF5A42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9A60F2-516D-4ECA-9ABC-4887EC4176E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*",
"matchCriteriaId": "AB49750B-DAA1-4417-8384-1F4D47F2227D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*",
"matchCriteriaId": "1099D38B-82EC-43C9-9DF5-D5EDC19834DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*",
"matchCriteriaId": "A6D64030-1877-4F29-8340-93DB6E0F1F13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AC1241-B922-4BE7-93C1-077FC0DA1CA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*",
"matchCriteriaId": "D65D0F7A-9414-4CF5-8460-DFDB55F61E5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*",
"matchCriteriaId": "85184E8A-C42D-4CBD-ACB4-B58752C305D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*",
"matchCriteriaId": "D422BB16-9F9C-4554-B2F1-826EB5BCB1ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*",
"matchCriteriaId": "DA682571-536B-4CD9-A820-47E897B01480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*",
"matchCriteriaId": "298457B8-051B-46D0-81B4-C5B63B69EB98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*",
"matchCriteriaId": "D7D4BC07-C37E-4F99-8DEA-54A45250050A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2B80FF-7ACB-43F5-9BD5-BF18A0EB4DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
},
{
"lang": "es",
"value": "Opera anteriores a v9.63 no verifica de forma adecuada los certificados X.509 de servidores SSL, los que permitir\u00eda ataques hombre en medio (man-in-the-middle) para espiar servidores y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado manipulado."
}
],
"id": "CVE-2012-1251",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-06-04T17:55:01.633",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN39707339/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000049"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.opera.com/docs/changelogs/mac/963/"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.opera.com/docs/changelogs/unix/963/"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.opera.com/docs/changelogs/windows/963/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN39707339/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000049"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.opera.com/docs/changelogs/mac/963/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.opera.com/docs/changelogs/unix/963/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.opera.com/docs/changelogs/windows/963/"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-RMMQ-MJP3-4464
Vulnerability from github – Published: 2022-05-17 04:51 – Updated: 2025-04-11 03:58
VLAI?
Details
Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
{
"affected": [],
"aliases": [
"CVE-2012-1251"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-06-04T17:55:00Z",
"severity": "MODERATE"
},
"details": "Opera before 9.63 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.",
"id": "GHSA-rmmq-mjp3-4464",
"modified": "2025-04-11T03:58:03Z",
"published": "2022-05-17T04:51:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1251"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN39707339/index.html"
},
{
"type": "WEB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000049"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/mac/963"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/unix/963"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/windows/963"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…