This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Opera First view 2003-11-17
Product Opera Browser Last view 2019-03-21
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:* 233
cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:* 233
cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:* 233
cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:* 232
cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:* 232
cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:* 232
cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:* 232
cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:* 231
cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:* 230
cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:* 229
cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* 229
cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:* 229
cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:* 229
cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:* 229
cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:* 228
cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:* 228
cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:* 226
cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:* 226
cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:* 226
cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:* 226

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2019-03-21 CVE-2018-18913

Opera before 57.0.3098.106 is vulnerable to a DLL Search Order hijacking attack where an attacker can send a ZIP archive composed of an HTML page along with a malicious DLL to the target. Once the document is opened, it may allow the attacker to take full control of the system from any location within the system. The issue lies in the loading of the shcore.dll and dcomp.dll files: these files are being searched for by the program in the same system-wide directory where the HTML file is executed.

4.3 2018-03-28 CVE-2018-6608

In the WebRTC component in Opera 51.0.2830.55, after visiting a web site that attempts to gather complete client information (such as https://ip.voidsec.com), the browser can disclose a private IP address in a STUN request.

6.1 2017-04-20 CVE-2016-4075

Opera Mini 13 and Opera Stable 36 allow remote attackers to spoof the displayed URL via a crafted HTML document, related to the about:blank URL.

6.1 2017-01-26 CVE-2016-6908

Characters from languages are such as Arabic, Hebrew are displayed from RTL (Right To Left) order in Opera 37.0.2192.105088 for Android, due to mishandling of several unicode characters such as U+FE70, U+0622, U+0623 etc and how they are rendered combined with (first strong character) such as an IP address or alphabet could lead to a spoofed URL. It was noticed that by placing neutral characters such as "/", "?" in filepath causes the URL to be flipped and displayed from Right To Left. However, in order for the URL to be spoofed the URL must begin with an IP address followed by neutral characters as omnibox considers IP address to be combination of punctuation and numbers and since LTR (Left To Right) direction is not properly enforced, this causes the entire URL to be treated and rendered from RTL (Right To Left). However, it doesn't have be an IP address, what matters is that first strong character (generally, alphabetic character) in the URL must be an RTL character.

5.3 2016-09-06 CVE-2016-7153

The HTTP/2 protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.

3.7 2015-05-20 CVE-2015-4000

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

4.3 2014-02-06 CVE-2014-1870

Opera before 19 on Mac OS X allows user-assisted remote attackers to spoof the address bar via vectors involving a drag-and-drop operation.

4.3 2014-02-06 CVE-2014-0815

The intent: URL implementation in Opera before 18 on Android allows attackers to read local files by leveraging an interaction error, as demonstrated by reading stored cookies.

4.3 2013-09-13 CVE-2013-4705

Cross-site scripting (XSS) vulnerability in Opera before 15.00 allows remote attackers to inject arbitrary web script or HTML by leveraging UTF-8 encoding.

10 2013-04-19 CVE-2013-3211

Unspecified vulnerability in Opera before 12.15 has unknown impact and attack vectors, related to a "moderately severe issue."

5 2013-04-19 CVE-2013-3210

Opera before 12.15 does not properly block top-level domains in Set-Cookie headers, which allows remote attackers to obtain sensitive information by leveraging control of a different web site in the same top-level domain.

6.8 2013-02-08 CVE-2013-1639

Opera before 12.13 does not send CORS preflight requests in all required cases, which allows remote attackers to bypass a CSRF protection mechanism via a crafted web site that triggers a CORS request.

9.3 2013-02-08 CVE-2013-1638

Opera before 12.13 allows remote attackers to execute arbitrary code via crafted clipPaths in an SVG document.

9.3 2013-02-08 CVE-2013-1637

Opera before 12.13 allows remote attackers to execute arbitrary code via vectors involving DOM events.

4 2013-02-08 CVE-2013-1618

The TLS implementation in Opera before 12.13 does not properly consider timing side-channel attacks on a MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

4.6 2013-01-02 CVE-2012-6472

Opera before 12.12 on UNIX uses weak permissions for the profile directory, which allows local users to obtain sensitive information by reading a (1) cache file, (2) password file, or (3) configuration file, or (4) possibly gain privileges by modifying or overwriting a configuration file.

5 2013-01-02 CVE-2012-6471

Opera before 12.12 allows remote attackers to spoof the address field via a high rate of HTTP requests.

9.3 2013-01-02 CVE-2012-6470

Opera before 12.12 does not properly allocate memory for GIF images, which allows remote attackers to execute arbitrary code or cause a denial of service (memory overwrite) via a malformed image.

5 2013-01-02 CVE-2012-6469

Opera before 12.11 allows remote attackers to determine the existence of arbitrary local files via vectors involving web script in an error page.

9.3 2013-01-02 CVE-2012-6468

Heap-based buffer overflow in Opera before 12.11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long HTTP response.

4.3 2013-01-02 CVE-2012-6467

Opera before 12.10 follows Internet shortcuts that are referenced by a (1) IMG element or (2) other inline element, which makes it easier for remote attackers to conduct phishing attacks via a crafted web site, as exploited in the wild in November 2012.

5 2013-01-02 CVE-2012-6466

Opera before 12.10 does not properly handle incorrect size data in a WebP image, which allows remote attackers to obtain potentially sensitive information from process memory by using a crafted image as the fill pattern for a canvas.

9.3 2013-01-02 CVE-2012-6465

Opera before 12.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a malformed SVG image.

4.3 2013-01-02 CVE-2012-6464

Cross-site scripting (XSS) vulnerability in Opera before 12.10 allows remote attackers to inject arbitrary web script or HTML via crafted JavaScript code that overrides methods of unspecified native objects in documents that have different origins.

4.3 2013-01-02 CVE-2012-6463

Cross-site scripting (XSS) vulnerability in Opera before 12.10 allows remote attackers to inject arbitrary web script or HTML via vectors involving an unspecified sequence of loading of documents and loading of data: URLs.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
14% (29) CWE-20 Improper Input Validation
13% (27) CWE-264 Permissions, Privileges, and Access Controls
11% (24) CWE-399 Resource Management Errors
11% (24) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
10% (21) CWE-200 Information Exposure
6% (13) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
3% (8) CWE-310 Cryptographic Issues
3% (8) CWE-94 Failure to Control Generation of Code ('Code Injection')
2% (5) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
1% (4) CWE-787 Out-of-bounds Write
1% (4) CWE-287 Improper Authentication
1% (4) CWE-189 Numeric Errors
1% (4) CWE-74 Failure to Sanitize Data into a Different Plane ('Injection')
1% (3) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (3) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
0% (2) CWE-362 Race Condition
0% (2) CWE-16 Configuration
0% (1) CWE-770 Allocation of Resources Without Limits or Throttling
0% (1) CWE-763 Release of Invalid Pointer or Reference
0% (1) CWE-669 Incorrect Resource Transfer Between Spheres
0% (1) CWE-668 Exposure of Resource to Wrong Sphere
0% (1) CWE-427 Uncontrolled Search Path Element
0% (1) CWE-426 Untrusted Search Path
0% (1) CWE-416 Use After Free
0% (1) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-2 Inducing Account Lockout
CAPEC-26 Leveraging Race Conditions
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
CAPEC-56 Removing/short-circuiting 'guard logic'
CAPEC-82 Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi...
CAPEC-88 OS Command Injection
CAPEC-99 XML Parser Attack
CAPEC-119 Resource Depletion
CAPEC-121 Locate and Exploit Test APIs
CAPEC-125 Resource Depletion through Flooding
CAPEC-130 Resource Depletion through Allocation
CAPEC-133 Try All Common Application Switches and Options
CAPEC-147 XML Ping of Death
CAPEC-172 Time and State Attacks
CAPEC-197 XEE (XML Entity Expansion)
CAPEC-227 Denial of Service through Resource Depletion
CAPEC-228 Resource Depletion through DTD Injection in a SOAP Message
CAPEC-229 XML Attribute Blowup

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:11229 The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and ...
oval:org.mitre.oval:def:100029 Mozilla IDN Homograph Spoofing Vulnerability
oval:org.mitre.oval:def:9332 Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Ko...
oval:org.mitre.oval:def:21835 ELSA-2007:0494: kdebase security update (Important)
oval:org.mitre.oval:def:24920 Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Ko...
oval:org.mitre.oval:def:24322 DEPRECATED: Integer overflow in Adobe Flash Player 9.0.45.0 and earlier might...
oval:org.mitre.oval:def:23992 Unspecified vulnerability in Adobe Flash Player 9.0.47.0 and earlier, when ru...
oval:org.mitre.oval:def:6230 Opera Unspecified Vulnerability
oval:org.mitre.oval:def:5955 Opera Execution of arbitrary code Vulnerability
oval:org.mitre.oval:def:6220 Opera cross-domain scripting attacks Vulnerability
oval:org.mitre.oval:def:5432 Opera Web Browser Denial Of Service Vulnerability
oval:org.mitre.oval:def:5957 Opera integer value denial of service
oval:org.mitre.oval:def:6444 Opera before 10.00 does not properly handle a \0 character or invalid wildcar...
oval:org.mitre.oval:def:6442 Opera before 10.00 trusts root X.509 certificates signed with the MD2 algorithm
oval:org.mitre.oval:def:6357 Opera before 10.00 does not check all intermediate X.509 certificates for rev...
oval:org.mitre.oval:def:6460 Opera before 10.00 allow remote attacks to spoof URLs
oval:org.mitre.oval:def:5679 DEPRECATED: Opera before 10.00 does not properly implement the INPUT TYPE=fil...
oval:org.mitre.oval:def:6235 Opera before 10.00 does not properly display all characters in Internationali...
oval:org.mitre.oval:def:6350 Opera 9.52 and earlier allows to cause denial of service Vulnerability
oval:org.mitre.oval:def:6370 Cross-site scripting (XSS) vulnerability in Opera 9 and 10
oval:org.mitre.oval:def:6314 Opera 9 and 10 allows remote attackers to conduct XSS Vulnerability
oval:org.mitre.oval:def:6358 Opera 'keygen' HTML Tag Denial of Service Vulnerability
oval:org.mitre.oval:def:6574 Memory corruption error in Opera before 10.01 when processing malformed domai...
oval:org.mitre.oval:def:6384 Memory corruption error in Opera before 10.01 when processing malformed domai...
oval:org.mitre.oval:def:6385 Opera before 10.10 allows to obtain sensitive information and XSS attacks

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
77617 Opera Unspecified Resource Consumption Remote DoS
77616 Opera Web Workers Unspecified Remote DoS
77615 Opera Dragonfly Unspecified Remote DoS
77614 Opera Certificate Revocation Corner Cases Unspecified Remote Issue
77607 Opera JavaScript Implementation getComputedStyle Method Page Handling Remote ...
77603 Opera CSS visited Pseudo-class Handling Browsing History Disclosure
77552 Opera Same Origin Policy Bypass in Operator Variable Enumeration
77551 Opera Top Level Domain Restriction Cookie Handling Information Disclosure
77550 Opera Unspecified Remote Issue
77540 Opera Cache Objects IFRAME Handling Browsing History Disclosure
74829 SSL Chained Initialization Vector CBC Mode MiTM Weakness
74828 Opera Web Content Security Display Weakness
74452 Opera HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness Mi...
74176 Opera VEGAOpBitmap::AddLine Function SELECT Element Invalid Memory Write DoS
73858 Opera IFRAME Element SRC Attribute about:blank Value DoS
73857 Opera Embedded Java Applet Empty Parameter Value DoS
73856 Opera Hidden Animated GIF Continual Repaint CPU Consumption DoS
73855 Opera Unspecified Application Crash Remote DoS (2011-2638)
73854 Opera Unspecified Application Crash Remote DoS (2011-2637)
73853 Opera Unspecified Application Crash Remote DoS (2011-2636)
73852 Opera CSS Floated Element :hover Pseudo-class DoS
73851 Opera Search / Customization Hijacking Weakness
73850 Opera Certificate Revocation List (CRL) File Unspecified Remote DoS
73849 Opera Silverlight Instance Destruction Handling Remote DoS
73848 Opera CSS Column-count Property Infinite Repaint Loop Remote DoS

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-13 Name : SuSE Update for opera openSUSE-SU-2012:0610-1 (opera)
File : nvt/gb_suse_2012_0610_1.nasl
2012-10-19 Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-16351
File : nvt/gb_fedora_2012_16351_java-1.6.0-openjdk_fc16.nasl
2012-10-19 Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-16351
File : nvt/gb_fedora_2012_16351_java-1.7.0-openjdk_fc16.nasl
2012-09-26 Name : Gentoo Security Advisory GLSA 201209-11 (opera)
File : nvt/glsa_201209_11.nasl
2012-09-25 Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004)
File : nvt/gb_macosx_su12-004.nasl
2012-09-22 Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-13127
File : nvt/gb_fedora_2012_13127_java-1.6.0-openjdk_fc16.nasl
2012-09-04 Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-13138
File : nvt/gb_fedora_2012_13138_java-1.7.0-openjdk_fc16.nasl
2012-09-04 Name : Mandriva Update for fetchmail MDVSA-2012:149 (fetchmail)
File : nvt/gb_mandriva_MDVSA_2012_149.nasl
2012-09-03 Name : Opera Address Bar Spoofing Vulnerability (Windows)
File : nvt/gb_opera_address_bar_spoofing_vuln_win.nasl
2012-08-30 Name : FreeBSD Ports: fetchmail
File : nvt/freebsd_fetchmail16.nasl
2012-08-30 Name : Fedora Update for python3 FEDORA-2012-5785
File : nvt/gb_fedora_2012_5785_python3_fc17.nasl
2012-08-30 Name : Fedora Update for python-docs FEDORA-2012-5892
File : nvt/gb_fedora_2012_5892_python-docs_fc17.nasl
2012-08-30 Name : Fedora Update for python FEDORA-2012-5892
File : nvt/gb_fedora_2012_5892_python_fc17.nasl
2012-08-10 Name : Gentoo Security Advisory GLSA 201206-03 (Opera)
File : nvt/glsa_201206_03.nasl
2012-08-08 Name : Opera Multiple Vulnerabilities - August12 (Linux)
File : nvt/gb_opera_mult_vuln_aug12_lin.nasl
2012-08-08 Name : Opera Multiple Vulnerabilities - August12 (Mac OS X)
File : nvt/gb_opera_mult_vuln_aug12_macosx.nasl
2012-08-08 Name : Opera Multiple Vulnerabilities - August12 (Windows)
File : nvt/gb_opera_mult_vuln_aug12_win.nasl
2012-08-08 Name : Opera Multiple Vulnerabilities - August12 (Mac OS X)
File : nvt/gb_opera_show_page_dos_vuln_macosx.nasl
2012-08-03 Name : Mandriva Update for curl MDVSA-2012:058 (curl)
File : nvt/gb_mandriva_MDVSA_2012_058.nasl
2012-07-30 Name : CentOS Update for java CESA-2011:1380 centos5 x86_64
File : nvt/gb_CESA-2011_1380_java_centos5_x86_64.nasl
2012-07-30 Name : CentOS Update for firefox CESA-2012:1088 centos5
File : nvt/gb_CESA-2012_1088_firefox_centos5.nasl
2012-07-30 Name : CentOS Update for firefox CESA-2012:1088 centos6
File : nvt/gb_CESA-2012_1088_firefox_centos6.nasl
2012-07-30 Name : CentOS Update for thunderbird CESA-2012:1089 centos5
File : nvt/gb_CESA-2012_1089_thunderbird_centos5.nasl
2012-07-30 Name : CentOS Update for thunderbird CESA-2012:1089 centos6
File : nvt/gb_CESA-2012_1089_thunderbird_centos6.nasl
2012-07-19 Name : RedHat Update for firefox RHSA-2012:1088-01
File : nvt/gb_RHSA-2012_1088-01_firefox.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0158 Multiple Vulnerabilities in Oracle Java SE
Severity: Category I - VMSKEY: V0061089
2014-A-0030 Apple Mac OS X Security Update 2014-001
Severity: Category I - VMSKEY: V0044547
2013-A-0199 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0040786
2012-A-0048 Multiple Vulnerabilities in VMware vCenter Update Manager 5.0
Severity: Category I - VMSKEY: V0031901
2012-B-0006 Microsoft SSL/TLS Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0031054

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2019-03-12 Opera GIF parsing buffer overflow attempt
RuleID : 49115 - Type : BROWSER-OTHER - Revision : 1
2019-03-12 Opera GIF parsing buffer underflow attempt
RuleID : 49114 - Type : BROWSER-OTHER - Revision : 2
2019-03-12 Opera GIF parsing buffer overflow attempt
RuleID : 49113 - Type : BROWSER-OTHER - Revision : 1
2019-03-12 Opera GIF parsing buffer underflow attempt
RuleID : 49112 - Type : BROWSER-OTHER - Revision : 2
2015-05-21 Opera SVG use after free memory corruption attempt
RuleID : 34171 - Type : BROWSER-OTHER - Revision : 4
2015-05-21 Opera SVG use after free memory corruption attempt
RuleID : 34170 - Type : BROWSER-OTHER - Revision : 3
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33806 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33805 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33804 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33803 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33802 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33801 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL export grade ciphersuite server negotiation attempt
RuleID : 33800 - Type : SERVER-OTHER - Revision : 6
2015-04-14 SSL export grade ciphersuite server negotiation attempt
RuleID : 33799 - Type : SERVER-OTHER - Revision : 6
2015-04-14 SSL export grade ciphersuite server negotiation attempt
RuleID : 33798 - Type : SERVER-OTHER - Revision : 6
2015-04-14 SSL export grade ciphersuite server negotiation attempt
RuleID : 33797 - Type : SERVER-OTHER - Revision : 6
2015-04-14 SSL export grade ciphersuite server negotiation attempt
RuleID : 33796 - Type : SERVER-OTHER - Revision : 6
2015-04-14 SSL export grade ciphersuite server negotiation attempt
RuleID : 33795 - Type : SERVER-OTHER - Revision : 6
2015-04-14 SSL export grade ciphersuite server negotiation attempt
RuleID : 33794 - Type : SERVER-OTHER - Revision : 6
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33793 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33792 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33791 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33790 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33789 - Type : SERVER-OTHER - Revision : 5
2015-04-14 SSL request for export grade ciphersuite attempt
RuleID : 33788 - Type : SERVER-OTHER - Revision : 5

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-01-20 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201701-46.nasl - Type: ACT_GATHER_INFO
2016-10-06 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3688.nasl - Type: ACT_GATHER_INFO
2016-09-27 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2016-2385-1.nasl - Type: ACT_GATHER_INFO
2016-09-09 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-1064.nasl - Type: ACT_GATHER_INFO
2016-09-02 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2016-2209-1.nasl - Type: ACT_GATHER_INFO
2016-08-29 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2016-1618-1.nasl - Type: ACT_GATHER_INFO
2016-06-23 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10727.nasl - Type: ACT_GATHER_INFO
2016-06-08 Name: The remote Debian host is missing a security update.
File: debian_DLA-507.nasl - Type: ACT_GATHER_INFO
2016-06-01 Name: The remote device is affected by multiple vulnerabilities.
File: cisco_ace_A5_3_3.nasl - Type: ACT_GATHER_INFO
2016-05-31 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201605-06.nasl - Type: ACT_GATHER_INFO
2016-05-13 Name: A web application running on the remote host is affected by multiple vulnerab...
File: solarwinds_srm_profiler_6_2_3.nasl - Type: ACT_GATHER_INFO
2016-03-24 Name: The remote web server is affected by multiple vulnerabilities.
File: hpsmh_7_5_4.nasl - Type: ACT_GATHER_INFO
2016-03-14 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201603-11.nasl - Type: ACT_GATHER_INFO
2016-03-10 Name: The remote AIX host has a version of OpenSSL installed that is affected by mu...
File: aix_openssl_advisory17.nasl - Type: ACT_GATHER_INFO
2016-03-03 Name: The remote VMware ESXi / ESX host is missing a security-related patch.
File: vmware_VMSA-2012-0005_remote.nasl - Type: ACT_GATHER_INFO
2016-02-18 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-218.nasl - Type: ACT_GATHER_INFO
2016-02-17 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-215.nasl - Type: ACT_GATHER_INFO
2016-02-12 Name: A telephony application running on the remote host is affected by multiple vu...
File: asterisk_ast_2016_003.nasl - Type: ACT_GATHER_INFO
2016-02-05 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_559f3d1bcb1d11e580a4001999f8d30b.nasl - Type: ACT_GATHER_INFO
2016-02-03 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-102.nasl - Type: ACT_GATHER_INFO
2016-02-03 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-104.nasl - Type: ACT_GATHER_INFO
2016-02-02 Name: The remote service is affected by multiple vulnerabilities.
File: openssl_1_0_1r.nasl - Type: ACT_GATHER_INFO
2016-02-02 Name: The remote service is affected by multiple vulnerabilities.
File: openssl_1_0_2f.nasl - Type: ACT_GATHER_INFO
2016-01-26 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-92.nasl - Type: ACT_GATHER_INFO
2016-01-26 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2016-0224-1.nasl - Type: ACT_GATHER_INFO