Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-0450 (GCVE-0-2011-0450)
Vulnerability from cvelistv5 – Published: 2011-01-31 19:00 – Updated: 2024-08-06 21:51
VLAI?
EPSS
Summary
The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.667Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/support/kb/view/985/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.opera.com/docs/changelogs/windows/1101/"
},
{
"name": "ADV-2011-0231",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0231"
},
{
"name": "oval:org.mitre.oval:def:12369",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12369"
},
{
"name": "JVNDB-2011-000010",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000010.html"
},
{
"name": "70726",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/70726"
},
{
"name": "JVN#33880169",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN33880169/index.html"
},
{
"name": "43023",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43023"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-01-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/support/kb/view/985/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.opera.com/docs/changelogs/windows/1101/"
},
{
"name": "ADV-2011-0231",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0231"
},
{
"name": "oval:org.mitre.oval:def:12369",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12369"
},
{
"name": "JVNDB-2011-000010",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000010.html"
},
{
"name": "70726",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/70726"
},
{
"name": "JVN#33880169",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN33880169/index.html"
},
{
"name": "43023",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43023"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0450",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opera.com/support/kb/view/985/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/kb/view/985/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1101/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1101/"
},
{
"name": "ADV-2011-0231",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0231"
},
{
"name": "oval:org.mitre.oval:def:12369",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12369"
},
{
"name": "JVNDB-2011-000010",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000010.html"
},
{
"name": "70726",
"refsource": "OSVDB",
"url": "http://osvdb.org/70726"
},
{
"name": "JVN#33880169",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN33880169/index.html"
},
{
"name": "43023",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43023"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2011-0450",
"datePublished": "2011-01-31T19:00:00.000Z",
"dateReserved": "2011-01-14T00:00:00.000Z",
"dateUpdated": "2024-08-06T21:51:08.667Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
JVNDB-2011-000010
Vulnerability from jvndb - Published: 2011-02-02 14:53 - Updated:2011-02-02 14:53Summary
Opera may insecurely load executable files
Details
Opera may use unsafe methods for determining how to load executables (.exe).
Opera loads certain executables (.exe) when opening the folder where downloaded contents are stored. Opera contains an issue with the file search path, which may insecurely load executables.
Makoto Shiotsuki reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000010.html",
"dc:date": "2011-02-02T14:53+09:00",
"dcterms:issued": "2011-02-02T14:53+09:00",
"dcterms:modified": "2011-02-02T14:53+09:00",
"description": "Opera may use unsafe methods for determining how to load executables (.exe).\r\n\r\nOpera loads certain executables (.exe) when opening the folder where downloaded contents are stored. Opera contains an issue with the file search path, which may insecurely load executables.\r\n\r\nMakoto Shiotsuki reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000010.html",
"sec:cpe": {
"#text": "cpe:/a:opera:opera_browser",
"@product": "Opera",
"@vendor": "Opera Software ASA",
"@version": "2.2"
},
"sec:cvss": {
"@score": "5.1",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2011-000010",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN33880169",
"@id": "JVN#33880169",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0450",
"@id": "CVE-2011-0450",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0450",
"@id": "CVE-2011-0450",
"@source": "NVD"
},
{
"#text": "http://osvdb.org/70726",
"@id": "70726",
"@source": "OSVDB"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "Opera may insecurely load executable files"
}
FKIE_CVE-2011-0450
Vulnerability from fkie_nvd - Published: 2011-01-31 20:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3970EC5B-EC52-4208-AEDD-BE0C914FE917",
"versionEndIncluding": "11.00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CECFBC71-7814-4A24-A918-C593673727B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "57824075-E3F7-4B23-B4D6-8417C3147085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "FE078F27-6FC1-466C-8331-A89F8B6FE0B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "7B7673C9-C69E-4CD8-9AF4-57AA81B8038A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "5839EB88-DF5E-4AB0-899B-DF9F72F5F442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "2E1865A4-E038-4A1C-877D-5A3CFA9576BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "93966A66-4332-4E76-9B1A-2BBF10AF0ACC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F51D99-C77D-4DB6-8D4B-DF1CE9078543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FAA91E77-301C-48F6-9A57-D5FDCEF743BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C49DDEF-681C-4A34-9FF8-17249C42842D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "EF365891-F3FA-4740-94B2-01F85254A2F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E42B4261-C511-4F3A-8596-6BD4E343DC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9D2F38FE-7E98-48B2-B0B2-35312368B21F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "63687D75-860D-4A36-B6BB-45BD4268B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"matchCriteriaId": "BD500741-CF39-4F0C-9F96-6CBDFF8973D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"matchCriteriaId": "359941FD-A5CE-43C1-AA76-C1B79BCB08C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"matchCriteriaId": "CC9AC78A-CA47-476D-935E-67932BAB98A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E9662C-441F-4AB2-AC4C-30F31C32949A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D681B3-73E6-4257-84B4-DE83F6D659B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"matchCriteriaId": "CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF4EF8B-18CA-417C-BA30-024EE25B6AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E5F2A5-F50F-4085-AB7D-8C91121A429A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"matchCriteriaId": "3E90912E-0CF8-404B-9E86-461497C65A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"matchCriteriaId": "9E19DD71-9447-4946-931F-4866537C8BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "54075890-6E0C-4AB7-8BD5-2023419CC251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABC3435-77CD-4591-8282-7ADA60225CF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "91FA8A44-2CAF-4EE4-940F-0D09BD07FD39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "50B797C8-3290-4278-9D4B-A15A14FB8D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"matchCriteriaId": "FFEC078C-A8F4-471B-A367-59A86B78590D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E10F658D-D2E4-4789-8172-F8842C3EEA05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"matchCriteriaId": "55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"matchCriteriaId": "81687D99-7444-4205-A7BE-992CC758675F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D75C4301-68E9-4A10-B9C5-711252BF629B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"matchCriteriaId": "0B147C1A-EA6C-40C8-A54A-96840A6FE9DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CC690371-3326-421E-8BAC-14F48840671B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E20418A7-1FA7-45EF-99B5-12D283EA6CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE50982-8026-466C-9F51-867425C9986F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"matchCriteriaId": "B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B85C5F65-B814-4BF5-AB43-D0CFFE8175A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FD889EC7-E5D2-4137-B85C-86D7DB5CED27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"matchCriteriaId": "97452A26-7231-43BE-B70E-B8D05365CAB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DBA733-467C-4505-8199-DD25A5FFBF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "B332FF1C-731D-454C-AA9E-3534040F09E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"matchCriteriaId": "5CBAA39D-01A0-4B6B-926B-C36C238E5258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"matchCriteriaId": "6F3707AA-D67A-4966-8DE4-8AEAC3C99B36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9754B270-E01D-415E-9A91-09ECB9B82B28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "A01CAF7E-F196-4851-BF1B-CADA51DDBF6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "D4682E92-E5E7-4351-959E-25A79CA4271B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "76C58A91-23BA-4336-A81B-B7FDFAF6CA91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "EC6E40C4-FA29-4D7A-9018-44154503A68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"matchCriteriaId": "DF0002A4-8A90-471C-9813-F648D53E4F3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8A15E0FA-5570-4C5F-B087-38591D9EBABA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"matchCriteriaId": "3D9F72B1-F398-4E07-8652-2042ADDB8414",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA2F504-6690-4AAD-97A6-6487E450C92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"matchCriteriaId": "19B927D3-D766-4D53-9870-15A7184E4C6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"matchCriteriaId": "54FE202A-E068-4ECE-B61D-230EFF0E60B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"matchCriteriaId": "5B43E22F-D894-4763-BF55-C9B77911C8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"matchCriteriaId": "4218D36C-CCE7-443B-842B-AA1A2C865734",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"matchCriteriaId": "3311565E-3971-416B-AC9C-6CF9F4EF0F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB76FFE-CB54-4A5B-B8FF-02B1A5D55D88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"matchCriteriaId": "DFA48444-F998-425B-896A-CE9276869BA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"matchCriteriaId": "8D9BFC45-39DF-47A6-B013-4299D2A0FB01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"matchCriteriaId": "177B7245-4E8F-44E7-BF34-43939DD75AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"matchCriteriaId": "5F2B3A26-D8C3-4508-8A6B-3858D5CB8381",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"matchCriteriaId": "14200693-2B22-42BF-9917-FF4B541D9188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"matchCriteriaId": "2D03F8C2-1193-45ED-B38E-C76C41A0FD9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"matchCriteriaId": "F12E0FE8-3982-453B-9C01-ABB2DE96866F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"matchCriteriaId": "DA76A537-6A1B-41D8-A923-24DC77F92E0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"matchCriteriaId": "2FA36E65-596D-4E84-A15C-1DF5FA3AAC76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"matchCriteriaId": "320B5684-5006-4BA8-87ED-25C40E90F2DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4FE9E7F2-68B1-448D-86B6-52B345DD3C01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"matchCriteriaId": "5D3C98DA-3261-4BEB-8403-BE2E54A7056C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"matchCriteriaId": "137E9883-BF1D-4B54-A904-AFDE179452A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"matchCriteriaId": "872AEFA4-F7B2-49CF-8279-8BE602D70B95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"matchCriteriaId": "35400232-18B1-4641-8C98-6E8EB3A9C7E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"matchCriteriaId": "90EFC130-7E02-47AE-AC4E-569B59241FF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"matchCriteriaId": "3D2745A8-9F99-48AF-A3C9-9659FA542B86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"matchCriteriaId": "57C77E63-E7CF-4EFF-9177-715C1815A0F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*",
"matchCriteriaId": "4D74A8DF-DCD2-41AB-BDC1-A314B3B55DAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*",
"matchCriteriaId": "EECA4D0B-0313-4B34-9A69-EE91ECC37270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*",
"matchCriteriaId": "46482B92-C1CF-4B50-B419-568262B6F38B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*",
"matchCriteriaId": "F4619C12-AA06-4465-B595-47FC844B28A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*",
"matchCriteriaId": "C2046AA8-079B-49F9-A2F6-FCF58B509A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*",
"matchCriteriaId": "9D44F551-F0DF-4261-A13C-B81A4BD64D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*",
"matchCriteriaId": "542D7F0A-01AF-4377-A96A-348651F56B98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*",
"matchCriteriaId": "52A509DF-759B-466A-9D6E-4E4D559B0F8E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file."
},
{
"lang": "es",
"value": "El administrador de descargas en Opera anterior v11.01 sobre Windows no determina adecuadamente la ruta de la aplicaci\u00f3n del visualizador del sistema de archivos, lo que permite a atacantes remotos asistidos por el usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un sitio web manipulado que hospeda un archivo ejecutable."
}
],
"id": "CVE-2011-0450",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-01-31T20:00:49.360",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN33880169/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000010.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://osvdb.org/70726"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43023"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.opera.com/docs/changelogs/windows/1101/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.opera.com/support/kb/view/985/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0231"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12369"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN33880169/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/70726"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43023"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.opera.com/docs/changelogs/windows/1101/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.opera.com/support/kb/view/985/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0231"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12369"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-8F9P-PM99-G8Q8
Vulnerability from github – Published: 2022-05-17 01:02 – Updated: 2025-04-11 03:43
VLAI?
Details
The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.
{
"affected": [],
"aliases": [
"CVE-2011-0450"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-01-31T20:00:00Z",
"severity": "HIGH"
},
"details": "The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.",
"id": "GHSA-8f9p-pm99-g8q8",
"modified": "2025-04-11T03:43:30Z",
"published": "2022-05-17T01:02:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0450"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12369"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN33880169/index.html"
},
{
"type": "WEB",
"url": "http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000010.html"
},
{
"type": "WEB",
"url": "http://osvdb.org/70726"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43023"
},
{
"type": "WEB",
"url": "http://www.opera.com/docs/changelogs/windows/1101"
},
{
"type": "WEB",
"url": "http://www.opera.com/support/kb/view/985"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0231"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-0450
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2011-0450",
"description": "The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.",
"id": "GSD-2011-0450"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-0450"
],
"details": "The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.",
"id": "GSD-2011-0450",
"modified": "2023-12-13T01:19:03.746730Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0450",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opera.com/support/kb/view/985/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/kb/view/985/"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1101/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1101/"
},
{
"name": "ADV-2011-0231",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0231"
},
{
"name": "oval:org.mitre.oval:def:12369",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12369"
},
{
"name": "JVNDB-2011-000010",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000010.html"
},
{
"name": "70726",
"refsource": "OSVDB",
"url": "http://osvdb.org/70726"
},
{
"name": "JVN#33880169",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN33880169/index.html"
},
{
"name": "43023",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43023"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.00",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0450"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opera.com/docs/changelogs/windows/1101/",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.opera.com/docs/changelogs/windows/1101/"
},
{
"name": "http://www.opera.com/support/kb/view/985/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.opera.com/support/kb/view/985/"
},
{
"name": "JVNDB-2011-000010",
"refsource": "JVNDB",
"tags": [],
"url": "http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000010.html"
},
{
"name": "JVN#33880169",
"refsource": "JVN",
"tags": [],
"url": "http://jvn.jp/en/jp/JVN33880169/index.html"
},
{
"name": "70726",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/70726"
},
{
"name": "43023",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43023"
},
{
"name": "ADV-2011-0231",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0231"
},
{
"name": "oval:org.mitre.oval:def:12369",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12369"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-09-19T01:32Z",
"publishedDate": "2011-01-31T20:00Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…