Описание
Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-2083
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21698
- http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test
- http://secunia.com/advisories/10760
- http://www.opera.com/docs/changelogs/windows/750b1
- http://www.osvdb.org/3917
- http://www.securityfocus.com/bid/9640
EPSS
CVE ID
Связанные уязвимости
Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
EPSS