Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-1764
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-12 Apr, 2008 | 20:05
Updated At-08 Aug, 2017 | 01:30

Unspecified vulnerability in Opera before 9.27 has unknown impact and attack vectors related to "keyboard handling of password inputs."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Opera
opera
>>opera>>Versions up to 9.26(inclusive)
cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*
Opera
opera
>>opera>>5..10
cpe:2.3:a:opera:opera:5..10:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.0
cpe:2.3:a:opera:opera:5.0:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.0
cpe:2.3:a:opera:opera:5.0:beta_2:*:*:*:*:*:*
Opera
opera
>>opera>>5.0
cpe:2.3:a:opera:opera:5.0:beta_3:*:*:*:*:*:*
Opera
opera
>>opera>>5.0
cpe:2.3:a:opera:opera:5.0:beta_4:*:*:*:*:*:*
Opera
opera
>>opera>>5.0
cpe:2.3:a:opera:opera:5.0:beta_5:*:*:*:*:*:*
Opera
opera
>>opera>>5.0
cpe:2.3:a:opera:opera:5.0:beta_6:*:*:*:*:*:*
Opera
opera
>>opera>>5.0
cpe:2.3:a:opera:opera:5.0:beta_7:*:*:*:*:*:*
Opera
opera
>>opera>>5.0
cpe:2.3:a:opera:opera:5.0:beta_8:*:*:*:*:*:*
Opera
opera
>>opera>>5.1
cpe:2.3:a:opera:opera:5.1:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.02
cpe:2.3:a:opera:opera:5.02:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.2
cpe:2.3:a:opera:opera:5.2:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.3
cpe:2.3:a:opera:opera:5.3:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.4
cpe:2.3:a:opera:opera:5.4:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.5
cpe:2.3:a:opera:opera:5.5:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.6
cpe:2.3:a:opera:opera:5.6:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.7
cpe:2.3:a:opera:opera:5.7:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.8
cpe:2.3:a:opera:opera:5.8:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.9
cpe:2.3:a:opera:opera:5.9:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.10
cpe:2.3:a:opera:opera:5.10:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.11
cpe:2.3:a:opera:opera:5.11:*:*:*:*:*:*:*
Opera
opera
>>opera>>5.12
cpe:2.3:a:opera:opera:5.12:*:*:*:*:*:*:*
Opera
opera
>>opera>>6
cpe:2.3:a:opera:opera:6:beta_1:*:*:*:*:*:*
Opera
opera
>>opera>>6.0
cpe:2.3:a:opera:opera:6.0:*:*:*:*:*:*:*
Opera
opera
>>opera>>6.0
cpe:2.3:a:opera:opera:6.0:beta_1:*:*:*:*:*:*
Opera
opera
>>opera>>6.0
cpe:2.3:a:opera:opera:6.0:beta_2:*:*:*:*:*:*
Opera
opera
>>opera>>6.0
cpe:2.3:a:opera:opera:6.0:beta_3:*:*:*:*:*:*
Opera
opera
>>opera>>6.1
cpe:2.3:a:opera:opera:6.1:*:*:*:*:*:*:*
Opera
opera
>>opera>>6.01
cpe:2.3:a:opera:opera:6.01:*:*:*:*:*:*:*
Opera
opera
>>opera>>6.02
cpe:2.3:a:opera:opera:6.02:*:*:*:*:*:*:*
Opera
opera
>>opera>>6.03
cpe:2.3:a:opera:opera:6.03:*:*:*:*:*:*:*
Opera
opera
>>opera>>6.04
cpe:2.3:a:opera:opera:6.04:*:*:*:*:*:*:*
Opera
opera
>>opera>>6.05
cpe:2.3:a:opera:opera:6.05:*:*:*:*:*:*:*
Opera
opera
>>opera>>6.06
cpe:2.3:a:opera:opera:6.06:*:*:*:*:*:*:*
Opera
opera
>>opera>>6.11
cpe:2.3:a:opera:opera:6.11:*:*:*:*:*:*:*
Opera
opera
>>opera>>6.12
cpe:2.3:a:opera:opera:6.12:*:*:*:*:*:*:*
Opera
opera
>>opera>>7
cpe:2.3:a:opera:opera:7:beta_1:*:*:*:*:*:*
Opera
opera
>>opera>>7
cpe:2.3:a:opera:opera:7:beta_1.2:*:*:*:*:*:*
Opera
opera
>>opera>>7.0
cpe:2.3:a:opera:opera:7.0:*:*:*:*:*:*:*
Opera
opera
>>opera>>7.0
cpe:2.3:a:opera:opera:7.0:beta_1:*:*:*:*:*:*
Opera
opera
>>opera>>7.0
cpe:2.3:a:opera:opera:7.0:beta_1v2:*:*:*:*:*:*
Opera
opera
>>opera>>7.0
cpe:2.3:a:opera:opera:7.0:beta_2:*:*:*:*:*:*
Opera
opera
>>opera>>7.01
cpe:2.3:a:opera:opera:7.01:*:*:*:*:*:*:*
Opera
opera
>>opera>>7.02
cpe:2.3:a:opera:opera:7.02:*:*:*:*:*:*:*
Opera
opera
>>opera>>7.03
cpe:2.3:a:opera:opera:7.03:*:*:*:*:*:*:*
Opera
opera
>>opera>>7.10
cpe:2.3:a:opera:opera:7.10:*:*:*:*:*:*:*
Opera
opera
>>opera>>7.11
cpe:2.3:a:opera:opera:7.11:*:*:*:*:*:*:*
Opera
opera
>>opera>>7.20
cpe:2.3:a:opera:opera:7.20:*:*:*:*:*:*:*
Opera
opera
>>opera>>7.20
cpe:2.3:a:opera:opera:7.20:beta7:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.htmlcve@mitre.org
N/A
http://secunia.com/advisories/29679cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29735cve@mitre.org
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200804-14.xmlcve@mitre.org
N/A
http://www.opera.com/docs/changelogs/linux/927/cve@mitre.org
Patch
Vendor Advisory
http://www.opera.com/docs/changelogs/windows/927/cve@mitre.org
Patch
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41834cve@mitre.org
N/A
Change History
0Changes found

Details not found