Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2005-3006

Опубликовано: 21 сент. 2005
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

The mail client in Opera before 8.50 opens attached files from the user's cache directory without warning the user, which might allow remote attackers to inject arbitrary web script and spoof attachment filenames.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
Версия до 8.02 (включая)
cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*

EPSS

Процентиль: 78%
0.01116
Низкий

5 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

github
почти 4 года назад

The mail client in Opera before 8.50 opens attached files from the user's cache directory without warning the user, which might allow remote attackers to inject arbitrary web script and spoof attachment filenames.

EPSS

Процентиль: 78%
0.01116
Низкий

5 Medium

CVSS2

Дефекты

NVD-CWE-Other