cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2011-3389,https://securityvulnerability.io/vulnerability/CVE-2011-3389,,"The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a ""BEAST"" attack.",Opera,"Opera Browser,Internet Explorer,Windows,Chrome,Firefox",,,0.014329999685287476,false,,false,false,true,2015-03-28T10:28:16.000Z,true,false,false,,2011-09-06T19:00:00.000Z,0 CVE-2002-2311,https://securityvulnerability.io/vulnerability/CVE-2002-2311,,Microsoft Internet Explorer 6.0 and possibly others allows remote attackers to upload arbitrary file contents when users press a key corresponding to the JavaScript (1) event.ctrlKey or (2) event.shiftKey onkeydown event contained in a webpage. NOTE: it was reported that the vendor has disputed the severity of this issue.,Opera Software,"Opera Web Browser,Internet Explorer",,,0.5571799874305725,false,,false,false,false,,,false,false,,2002-12-31T05:00:00.000Z,0