Vulnerabilities > CVE-2011-4683 - Unspecified vulnerability in Opera Browser

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
opera
nessus

Summary

Unspecified vulnerability in Opera before 11.60 has unknown impact and attack vectors, related to a "moderately severe issue."

Vulnerable Configurations

Part Description Count
Application
Opera
125

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_OPERA-111208.NASL
    descriptionopera was updated to version 11.60 to fix several security issues
    last seen2020-06-01
    modified2020-06-02
    plugin id75699
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75699
    titleopenSUSE Security Update : opera (openSUSE-SU-2011:1314-1)
  • NASL familyWindows
    NASL idOPERA_1160.NASL
    descriptionThe version of Opera installed on the remote Windows host is prior to 11.60. It is, therefore, affected by multiple vulnerabilities : - An unspecified error exists that can allow URL spoofing in the address bar. (CVE-2011-4010) - Top level domain separation rules are not honored for two-letter top level domains, e.g.,
    last seen2020-06-01
    modified2020-06-02
    plugin id57039
    published2011-12-07
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57039
    titleOpera < 11.60 Multiple Vulnerabilities (BEAST)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201206-03.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201206-03 (Opera: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Opera. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted web page, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. A remote attacker may be able to: trick users into downloading and executing arbitrary files, bypass intended access restrictions, spoof trusted content, spoof URLs, bypass the Same Origin Policy, obtain sensitive information, force subscriptions to arbitrary feeds, bypass the popup blocker, bypass CSS filtering, conduct cross-site scripting attacks, or have other unknown impact. A local attacker could perform symlink attacks to overwrite arbitrary files with the privileges of the user running the application or possibly obtain sensitive information. A physically proximate attacker may be able to access an email account. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id59631
    published2012-06-21
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59631
    titleGLSA-201206-03 : Opera: Multiple vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_OPERA-111208.NASL
    descriptionopera was updated to version 11.60 to fix several security issues
    last seen2020-06-01
    modified2020-06-02
    plugin id75986
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75986
    titleopenSUSE Security Update : opera (openSUSE-SU-2011:1314-1)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2011-76.NASL
    descriptionOpera version update to 11.60
    last seen2020-06-01
    modified2020-06-02
    plugin id74533
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/74533
    titleopenSUSE Security Update : opera (openSUSE-2011-76)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_A4A809D825C811E1B53100215C6A37BB.NASL
    descriptionOpera software reports : - Fixed a moderately severe issue; details will be disclosed at a later date - Fixed an issue that could allow pages to set cookies or communicate cross-site for some top level domains; see our advisory - Improved handling of certificate revocation corner cases - Added a fix for a weakness in the SSL v3.0 and TLS 1.0 specifications, as reported by Thai Duong and Juliano Rizzo; see our advisory - Fixed an issue where the JavaScript
    last seen2020-06-01
    modified2020-06-02
    plugin id57294
    published2011-12-14
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57294
    titleFreeBSD : opera -- multiple vulnerabilities (a4a809d8-25c8-11e1-b531-00215c6a37bb) (BEAST)