ID CVE-2005-1091
Summary Maxthon 1.2.0 and 1.2.1 allows remote attackers to bypass the security ID and use restricted plugin API functions via script that includes the max.src file into the source page.
References
Vulnerable Configurations
  • cpe:2.3:a:maxthon:maxthon:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:maxthon:maxthon:1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:maxthon:maxthon:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:maxthon:maxthon:1.2.1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 05-09-2008 - 20:48)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 13073
misc http://www.raffon.net/advisories/maxthon/multvulns.html
osvdb 15424
secunia 14918
Last major update 05-09-2008 - 20:48
Published 02-05-2005 - 04:00
Last modified 05-09-2008 - 20:48
Back to Top