Логотип exploitDog
bind:CVE-2004-2083
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2004-2083

Количество 2

Количество 2

nvd логотип

CVE-2004-2083

почти 22 года назад

Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."

CVSS2: 2.6
EPSS: Низкий
github логотип

GHSA-qqg2-xjw3-r727

почти 4 года назад

Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2004-2083

Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."

CVSS2: 2.6
1%
Низкий
почти 22 года назад
github логотип
GHSA-qqg2-xjw3-r727

Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."

1%
Низкий
почти 4 года назад

Уязвимостей на страницу