Last Modified: July 22, 2021
Internet Explorer 5 allows remote attackers to read files via an ExecCommand method called on an IFRAME.
Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
Base Score: 4.3
Exploitability Score: 8.6
Impact Score: 2.9
CVSS V2: AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE-200
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:microsoft:internet_explorer:4.01:*:*:*:*:*:*:* Part: a Vendor: microsoft | Alle Schwachstellen für microsoft | |
cpe:2.3:a:microsoft:internet_explorer:4.01:sp1:*:*:*:*:*:* Part: a Vendor: microsoft | Alle Schwachstellen für microsoft | |
cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:* Part: a Vendor: microsoft | Alle Schwachstellen für microsoft |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:microsoft:internet_explorer:4.01:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:microsoft:internet_explorer:4.01:sp1:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:microsoft:internet_explorer:4.01:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:microsoft:internet_explorer:4.01:sp1:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="data" value="any"/> <prop key="data_influence" value="read"/> <prop key="range" value="remote"/> </set>