Maxthon 1.2.0 and 1.2.1 allows remote attackers to bypass the security ID and use restricted plugin API functions via script that includes the max.src file into the source page.
References
| Link | Resource |
|---|---|
| http://secunia.com/advisories/14918 | Patch Vendor Advisory |
| http://www.osvdb.org/15424 | |
| http://www.raffon.net/advisories/maxthon/multvulns.html | Exploit Patch Vendor Advisory |
| http://www.securityfocus.com/bid/13073 | Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2005-05-02 04:00
Updated : 2008-09-05 20:48
NVD link : CVE-2005-1091
Mitre link : CVE-2005-1091
CVE.ORG link : CVE-2005-1091
JSON object : View
Products Affected
maxthon
- maxthon
CWE
