CVE-2005-3006
Vulnerability from cvelistv5
Published
2005-09-21 04:00
Modified
2024-08-07 22:53
Severity ?
EPSS score ?
Summary
The mail client in Opera before 8.50 opens attached files from the user's cache directory without warning the user, which might allow remote attackers to inject arbitrary web script and spoof attachment filenames.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:53:30.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2005-1789", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1789" }, { "name": "14880", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14880" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-42/advisory/" }, { "name": "opera-mail-file-xss(22335)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/windows/850/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/linux/850/" }, { "name": "SuSE-SA:2005:057", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/9339" }, { "name": "20050920 Secunia Research: Opera Mail Client Attachment Spoofing and Script Insertion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112724692219695\u0026w=2" }, { "name": "19508", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/19508" }, { "name": "16645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16645" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The mail client in Opera before 8.50 opens attached files from the user\u0027s cache directory without warning the user, which might allow remote attackers to inject arbitrary web script and spoof attachment filenames." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2005-1789", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1789" }, { "name": "14880", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14880" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-42/advisory/" }, { "name": "opera-mail-file-xss(22335)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/windows/850/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/linux/850/" }, { "name": "SuSE-SA:2005:057", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.securityfocus.com/advisories/9339" }, { "name": "20050920 Secunia Research: Opera Mail Client Attachment Spoofing and Script Insertion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112724692219695\u0026w=2" }, { "name": "19508", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/19508" }, { "name": "16645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16645" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mail client in Opera before 8.50 opens attached files from the user\u0027s cache directory without warning the user, which might allow remote attackers to inject arbitrary web script and spoof attachment filenames." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2005-1789", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1789" }, { "name": "14880", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14880" }, { "name": "http://secunia.com/secunia_research/2005-42/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-42/advisory/" }, { "name": "opera-mail-file-xss(22335)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22335" }, { "name": "http://www.opera.com/docs/changelogs/windows/850/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/windows/850/" }, { "name": "http://www.opera.com/docs/changelogs/linux/850/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/linux/850/" }, { "name": "SuSE-SA:2005:057", "refsource": "SUSE", "url": "http://www.securityfocus.com/advisories/9339" }, { "name": "20050920 Secunia Research: Opera Mail Client Attachment Spoofing and Script Insertion", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112724692219695\u0026w=2" }, { "name": "19508", "refsource": "OSVDB", "url": "http://www.osvdb.org/19508" }, { "name": "16645", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16645" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3006", "datePublished": "2005-09-21T04:00:00", "dateReserved": "2005-09-21T00:00:00", "dateUpdated": "2024-08-07T22:53:30.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.02\", \"matchCriteriaId\": \"F23E47CD-F20D-4070-9AA0-9B08DF02E3EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F892EEF-54EC-4EC0-84B3-BD5C216AED80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"089BEFE3-24B2-4C73-BA25-7C905ED68A50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B73E6B0-2113-4D09-A665-7D8FEC3A3D59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"76AECDD0-C14D-4A68-AF2E-1C41A51089EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C06EBBF-8B64-4C22-9EDA-E133AFD205DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D888C22C-41F9-427D-9249-F010891DA48E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"326AE3EE-3BF3-4B7E-B3FC-445FB9D6E4C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94FAD06C-830A-4CB6-B9AF-7E093B64B69B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9BDFBD0-3CAC-4617-B1B2-7F95E7C648D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5366D587-7E77-4288-AB31-48108D04E0B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60EFFC44-A329-4FA5-B57C-FA8892F8226B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9241CFD0-9E61-487F-B076-2D7B8ACEA381\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACEE8213-BD3A-405B-BC4C-8B80EBDF5A42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A9A60F2-516D-4ECA-9ABC-4887EC4176E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB49750B-DAA1-4417-8384-1F4D47F2227D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1099D38B-82EC-43C9-9DF5-D5EDC19834DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6D64030-1877-4F29-8340-93DB6E0F1F13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5AC1241-B922-4BE7-93C1-077FC0DA1CA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D65D0F7A-9414-4CF5-8460-DFDB55F61E5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"85184E8A-C42D-4CBD-ACB4-B58752C305D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"D422BB16-9F9C-4554-B2F1-826EB5BCB1ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA682571-536B-4CD9-A820-47E897B01480\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*\", \"matchCriteriaId\": \"298457B8-051B-46D0-81B4-C5B63B69EB98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7D4BC07-C37E-4F99-8DEA-54A45250050A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E2B80FF-7ACB-43F5-9BD5-BF18A0EB4DD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CECFBC71-7814-4A24-A918-C593673727B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"57824075-E3F7-4B23-B4D6-8417C3147085\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE078F27-6FC1-466C-8331-A89F8B6FE0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B7673C9-C69E-4CD8-9AF4-57AA81B8038A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*\", \"matchCriteriaId\": \"5839EB88-DF5E-4AB0-899B-DF9F72F5F442\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E1865A4-E038-4A1C-877D-5A3CFA9576BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*\", \"matchCriteriaId\": \"93966A66-4332-4E76-9B1A-2BBF10AF0ACC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4F51D99-C77D-4DB6-8D4B-DF1CE9078543\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAA91E77-301C-48F6-9A57-D5FDCEF743BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C49DDEF-681C-4A34-9FF8-17249C42842D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF365891-F3FA-4740-94B2-01F85254A2F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E42B4261-C511-4F3A-8596-6BD4E343DC31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D2F38FE-7E98-48B2-B0B2-35312368B21F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"63687D75-860D-4A36-B6BB-45BD4268B6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD500741-CF39-4F0C-9F96-6CBDFF8973D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"359941FD-A5CE-43C1-AA76-C1B79BCB08C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9AC78A-CA47-476D-935E-67932BAB98A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E9662C-441F-4AB2-AC4C-30F31C32949A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8D681B3-73E6-4257-84B4-DE83F6D659B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BF4EF8B-18CA-417C-BA30-024EE25B6AE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9E5F2A5-F50F-4085-AB7D-8C91121A429A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E90912E-0CF8-404B-9E86-461497C65A5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E19DD71-9447-4946-931F-4866537C8BC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54075890-6E0C-4AB7-8BD5-2023419CC251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ABC3435-77CD-4591-8282-7ADA60225CF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91FA8A44-2CAF-4EE4-940F-0D09BD07FD39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7C35850-B79C-4EE4-A6F2-CC5D2304724B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B797C8-3290-4278-9D4B-A15A14FB8D3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFEC078C-A8F4-471B-A367-59A86B78590D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E10F658D-D2E4-4789-8172-F8842C3EEA05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81687D99-7444-4205-A7BE-992CC758675F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D75C4301-68E9-4A10-B9C5-711252BF629B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B147C1A-EA6C-40C8-A54A-96840A6FE9DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC690371-3326-421E-8BAC-14F48840671B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E20418A7-1FA7-45EF-99B5-12D283EA6CB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BE50982-8026-466C-9F51-867425C9986F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*\", \"matchCriteriaId\": \"B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B85C5F65-B814-4BF5-AB43-D0CFFE8175A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD889EC7-E5D2-4137-B85C-86D7DB5CED27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"97452A26-7231-43BE-B70E-B8D05365CAB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9DBA733-467C-4505-8199-DD25A5FFBF97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B332FF1C-731D-454C-AA9E-3534040F09E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7965089-8592-47F2-958B-7DBE669BCAC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1750B2D-7AC8-45CF-9879-1D0476EEE86C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CBAA39D-01A0-4B6B-926B-C36C238E5258\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F3707AA-D67A-4966-8DE4-8AEAC3C99B36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECEE4473-88C0-4E28-A5B5-F7383B0E5558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76410AD4-78CA-48EA-83F0-099D0A49626F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9754B270-E01D-415E-9A91-09ECB9B82B28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A01CAF7E-F196-4851-BF1B-CADA51DDBF6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4682E92-E5E7-4351-959E-25A79CA4271B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DF2B21F-7E97-416B-AF5C-35338A254552\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The mail client in Opera before 8.50 opens attached files from the user\u0027s cache directory without warning the user, which might allow remote attackers to inject arbitrary web script and spoof attachment filenames.\"}]", "id": "CVE-2005-3006", "lastModified": "2024-11-21T00:00:55.023", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2005-09-21T20:03:00.000", "references": "[{\"url\": \"http://marc.info/?l=bugtraq\u0026m=112724692219695\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/16645\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/secunia_research/2005-42/advisory/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.opera.com/docs/changelogs/linux/850/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opera.com/docs/changelogs/windows/850/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/19508\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/advisories/9339\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/14880\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2005/1789\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/22335\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=112724692219695\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/16645\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/secunia_research/2005-42/advisory/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.opera.com/docs/changelogs/linux/850/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opera.com/docs/changelogs/windows/850/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/19508\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/advisories/9339\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/14880\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2005/1789\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/22335\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2005-3006\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-09-21T20:03:00.000\",\"lastModified\":\"2024-11-21T00:00:55.023\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The mail client in Opera before 8.50 opens attached files from the user\u0027s cache directory without warning the user, which might allow remote attackers to inject arbitrary web script and spoof attachment filenames.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.02\",\"matchCriteriaId\":\"F23E47CD-F20D-4070-9AA0-9B08DF02E3EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F892EEF-54EC-4EC0-84B3-BD5C216AED80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"089BEFE3-24B2-4C73-BA25-7C905ED68A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B73E6B0-2113-4D09-A665-7D8FEC3A3D59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"76AECDD0-C14D-4A68-AF2E-1C41A51089EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C06EBBF-8B64-4C22-9EDA-E133AFD205DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D888C22C-41F9-427D-9249-F010891DA48E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326AE3EE-3BF3-4B7E-B3FC-445FB9D6E4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94FAD06C-830A-4CB6-B9AF-7E093B64B69B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BDFBD0-3CAC-4617-B1B2-7F95E7C648D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5366D587-7E77-4288-AB31-48108D04E0B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60EFFC44-A329-4FA5-B57C-FA8892F8226B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9241CFD0-9E61-487F-B076-2D7B8ACEA381\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACEE8213-BD3A-405B-BC4C-8B80EBDF5A42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A9A60F2-516D-4ECA-9ABC-4887EC4176E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB49750B-DAA1-4417-8384-1F4D47F2227D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1099D38B-82EC-43C9-9DF5-D5EDC19834DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D64030-1877-4F29-8340-93DB6E0F1F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AC1241-B922-4BE7-93C1-077FC0DA1CA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D65D0F7A-9414-4CF5-8460-DFDB55F61E5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"85184E8A-C42D-4CBD-ACB4-B58752C305D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D422BB16-9F9C-4554-B2F1-826EB5BCB1ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA682571-536B-4CD9-A820-47E897B01480\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"298457B8-051B-46D0-81B4-C5B63B69EB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D4BC07-C37E-4F99-8DEA-54A45250050A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B80FF-7ACB-43F5-9BD5-BF18A0EB4DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECFBC71-7814-4A24-A918-C593673727B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"57824075-E3F7-4B23-B4D6-8417C3147085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE078F27-6FC1-466C-8331-A89F8B6FE0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"822FC5FB-3A6F-4F5B-A75B-7D42C3DB8E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7673C9-C69E-4CD8-9AF4-57AA81B8038A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5839EB88-DF5E-4AB0-899B-DF9F72F5F442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E1865A4-E038-4A1C-877D-5A3CFA9576BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"93966A66-4332-4E76-9B1A-2BBF10AF0ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F51D99-C77D-4DB6-8D4B-DF1CE9078543\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA91E77-301C-48F6-9A57-D5FDCEF743BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49DDEF-681C-4A34-9FF8-17249C42842D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF365891-F3FA-4740-94B2-01F85254A2F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42B4261-C511-4F3A-8596-6BD4E343DC31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2F38FE-7E98-48B2-B0B2-35312368B21F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63687D75-860D-4A36-B6BB-45BD4268B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD500741-CF39-4F0C-9F96-6CBDFF8973D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"359941FD-A5CE-43C1-AA76-C1B79BCB08C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9AC78A-CA47-476D-935E-67932BAB98A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E9662C-441F-4AB2-AC4C-30F31C32949A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D681B3-73E6-4257-84B4-DE83F6D659B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD1A2C1-74F6-4CFC-B4F3-4CE3F1E49E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF4EF8B-18CA-417C-BA30-024EE25B6AE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E5F2A5-F50F-4085-AB7D-8C91121A429A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E90912E-0CF8-404B-9E86-461497C65A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E19DD71-9447-4946-931F-4866537C8BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54075890-6E0C-4AB7-8BD5-2023419CC251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ABC3435-77CD-4591-8282-7ADA60225CF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91FA8A44-2CAF-4EE4-940F-0D09BD07FD39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7C35850-B79C-4EE4-A6F2-CC5D2304724B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B797C8-3290-4278-9D4B-A15A14FB8D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEC078C-A8F4-471B-A367-59A86B78590D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10F658D-D2E4-4789-8172-F8842C3EEA05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B110B5-ADE5-46AB-8BF1-AF61A0ECE5D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C6479D-4E40-4ED0-9A9D-9725CF3F0DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81687D99-7444-4205-A7BE-992CC758675F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75C4301-68E9-4A10-B9C5-711252BF629B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B147C1A-EA6C-40C8-A54A-96840A6FE9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC690371-3326-421E-8BAC-14F48840671B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E20418A7-1FA7-45EF-99B5-12D283EA6CB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE50982-8026-466C-9F51-867425C9986F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54B2BD7-AB8F-4124-87EE-7A4BBEB348C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B85C5F65-B814-4BF5-AB43-D0CFFE8175A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0FAFA5-D27A-4F57-8B25-3E98DBF279A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD889EC7-E5D2-4137-B85C-86D7DB5CED27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"97452A26-7231-43BE-B70E-B8D05365CAB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DBA733-467C-4505-8199-DD25A5FFBF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B332FF1C-731D-454C-AA9E-3534040F09E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7965089-8592-47F2-958B-7DBE669BCAC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1750B2D-7AC8-45CF-9879-1D0476EEE86C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBAA39D-01A0-4B6B-926B-C36C238E5258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F3707AA-D67A-4966-8DE4-8AEAC3C99B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEE4473-88C0-4E28-A5B5-F7383B0E5558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76410AD4-78CA-48EA-83F0-099D0A49626F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9754B270-E01D-415E-9A91-09ECB9B82B28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01CAF7E-F196-4851-BF1B-CADA51DDBF6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4682E92-E5E7-4351-959E-25A79CA4271B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF2B21F-7E97-416B-AF5C-35338A254552\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112724692219695\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/16645\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2005-42/advisory/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/linux/850/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opera.com/docs/changelogs/windows/850/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/19508\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/advisories/9339\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/14880\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/1789\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/22335\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112724692219695\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/16645\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2005-42/advisory/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/linux/850/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opera.com/docs/changelogs/windows/850/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/19508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/advisories/9339\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/14880\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2005/1789\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/22335\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.