mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
88 lines
2.5 KiB
JSON
88 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2005-2405",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Opera 8.01, when the \"Arial Unicode MS\" font (ARIALUNI.TTF) is installed, does not properly handle extended ASCII characters in the file download dialog box, which allows remote attackers to spoof file extensions and possibly trick users into executing arbitrary code."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://www.opera.com/linux/changelogs/802/",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.opera.com/linux/changelogs/802/"
|
|
},
|
|
{
|
|
"name" : "14402",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/14402"
|
|
},
|
|
{
|
|
"name" : "ADV-2005-1251",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2005/1251"
|
|
},
|
|
{
|
|
"name" : "1014592",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1014592"
|
|
},
|
|
{
|
|
"name" : "15870",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/15870"
|
|
},
|
|
{
|
|
"name" : "opera-content-disposition-extension-spoofing(21784)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/21784"
|
|
}
|
|
]
|
|
}
|
|
}
|