Executive Summary

Informations
Name CVE-2005-3007 First vendor Publication 2005-09-21
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:N/I:P/A:N)
Cvss Base Score 2.6 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Opera before 8.50 allows remote attackers to spoof the content type of files via a filename with a trailing "." (dot), which might allow remote attackers to trick users into processing dangerous content.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3007

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-74 Failure to Sanitize Data into a Different Plane ('Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 88

Open Source Vulnerability Database (OSVDB)

Id Description
19509 Opera Mail Client Crafted Content-Type File Extension Spoofing

Opera contains a flaw that may allow a remote user to spoof file types and cause a target user to execute arbitrary code. The issue is triggered when an additional '.' is appended to the end of a filename, which could allow an extension to be spoofed. It is possible that the flaw may allow a script insertion attack, if the user chooses to view an attachment resulting in a loss of confidentiality.

Nessus® Vulnerability Scanner

Date Description
2005-09-21 Name : The remote host contains a web browser which is vulnerable to attachment spoo...
File : opera_850.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://marc.info/?l=bugtraq&m=112724692219695&w=2
http://secunia.com/advisories/16645
http://secunia.com/secunia_research/2005-42/advisory/
http://www.opera.com/docs/changelogs/linux/850/
http://www.opera.com/docs/changelogs/windows/850/
http://www.osvdb.org/19509
http://www.securityfocus.com/advisories/9339
http://www.securityfocus.com/bid/14880
http://www.vupen.com/english/advisories/2005/1789
https://exchange.xforce.ibmcloud.com/vulnerabilities/22337
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2024-11-28 23:21:53
  • Multiple Updates
2024-11-28 12:07:27
  • Multiple Updates
2022-03-02 01:02:21
  • Multiple Updates
2022-02-28 21:23:20
  • Multiple Updates
2021-05-04 12:03:11
  • Multiple Updates
2021-04-22 01:03:28
  • Multiple Updates
2020-05-23 00:16:50
  • Multiple Updates
2017-07-11 12:02:01
  • Multiple Updates
2016-11-22 09:22:56
  • Multiple Updates
2016-10-18 12:01:47
  • Multiple Updates
2016-06-28 15:21:42
  • Multiple Updates
2016-04-26 13:49:20
  • Multiple Updates
2014-02-17 10:32:57
  • Multiple Updates
2013-05-11 11:31:59
  • Multiple Updates