CVE-2005-3006
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/09/2005
Last modified:
03/04/2025
Description
The mail client in Opera before 8.50 opens attached files from the user's cache directory without warning the user, which might allow remote attackers to inject arbitrary web script and spoof attachment filenames.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* | 8.02 (including) | |
| cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=112724692219695&w=2
- http://secunia.com/advisories/16645
- http://secunia.com/secunia_research/2005-42/advisory/
- http://www.opera.com/docs/changelogs/linux/850/
- http://www.opera.com/docs/changelogs/windows/850/
- http://www.osvdb.org/19508
- http://www.securityfocus.com/advisories/9339
- http://www.securityfocus.com/bid/14880
- http://www.vupen.com/english/advisories/2005/1789
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22335
- http://marc.info/?l=bugtraq&m=112724692219695&w=2
- http://secunia.com/advisories/16645
- http://secunia.com/secunia_research/2005-42/advisory/
- http://www.opera.com/docs/changelogs/linux/850/
- http://www.opera.com/docs/changelogs/windows/850/
- http://www.osvdb.org/19508
- http://www.securityfocus.com/advisories/9339
- http://www.securityfocus.com/bid/14880
- http://www.vupen.com/english/advisories/2005/1789
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22335



