New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 6.7
SynopsisThe remote host contains a web browser that is affected by multiple vulnerabilities.
DescriptionThe version of Opera installed on the remote Windows host is prior to 11.60. It is, therefore, affected by multiple vulnerabilities :
- An unspecified error exists that can allow URL spoofing in the address bar. (CVE-2011-4010)
- Top level domain separation rules are not honored for two-letter top level domains, e.g., '.us' or '.uk', and some three-letter top level domains. This error can allow sites to set the scripting context to the top level domain. Further, this can allow sites to set and read cookies from other sites whose scripting context is set to the same top level domain. (CVE-2011-4681)
- An unspecified, moderately severe issue exists. Details are to be disclosed by the vendor at a later date.
- The browser does not properly handle certain corner cases related to certificate revocation. (CVE-2011-4684)
- Unspecified content can cause the 'Dragonfly' component of the browser to crash. (CVE-2011-4685)
- An unspecified error exists related to the 'Web Workers' implementation that can allow application crashes. (CVE-2011-4686)
- An unspecified error exists that can allow remote content to cause denial of service conditions via resource consumption. (CVE-2011-4687)
SolutionUpgrade to Opera 11.60 or later.