Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
Link | Tags |
---|---|
http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/ | broken link vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21698 | vdb entry third party advisory |
http://www.securityfocus.com/bid/9640 | exploit vdb entry third party advisory broken link |
http://www.osvdb.org/3917 | vdb entry broken link |
http://secunia.com/advisories/10760 | broken link third party advisory vendor advisory |
http://www.opera.com/docs/changelogs/windows/750b1/ | broken link |