CVE-2004-2083

Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
Configurations

Configuration 1 (hide)

cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:52

Type Values Removed Values Added
References () http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/ - Broken Link, Vendor Advisory () http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/ - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/10760 - Broken Link, Vendor Advisory () http://secunia.com/advisories/10760 - Broken Link, Vendor Advisory
References () http://www.opera.com/docs/changelogs/windows/750b1/ - Broken Link () http://www.opera.com/docs/changelogs/windows/750b1/ - Broken Link
References () http://www.osvdb.org/3917 - Broken Link () http://www.osvdb.org/3917 - Broken Link
References () http://www.securityfocus.com/bid/9640 - Broken Link, Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/9640 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/21698 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/21698 - Third Party Advisory, VDB Entry

Information

Published : 2004-02-11 05:00

Updated : 2025-04-03 01:03


NVD link : CVE-2004-2083

Mitre link : CVE-2004-2083

CVE.ORG link : CVE-2004-2083


JSON object : View

Products Affected

opera

  • opera_browser