CVE-2004-2083
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/02/2004
Last modified:
03/04/2025
Description
Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
Impact
Base Score 2.0
2.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* | 7.0 (including) | 7.23 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/
- http://secunia.com/advisories/10760
- http://www.opera.com/docs/changelogs/windows/750b1/
- http://www.osvdb.org/3917
- http://www.securityfocus.com/bid/9640
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21698
- http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/
- http://secunia.com/advisories/10760
- http://www.opera.com/docs/changelogs/windows/750b1/
- http://www.osvdb.org/3917
- http://www.securityfocus.com/bid/9640
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21698



