10
CVSSv2

CVE-2004-0549

Published: 06/08/2004 Updated: 23/07/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote malicious users to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet explorer

microsoft internet explorer 6.0

microsoft internet explorer 5.01

microsoft internet explorer 5.5

Exploits

----------------------------------------------------- defaulthtm ------------------------------------------------------- <html> <body> <img src="ccexe" width=0 height=0 style=display:none> <script language="Javascript"> function InjectedDuringRedirection(){ showModalDialog('mdhtm',window,"dialogTop:-1000\;dialogLeft:- ...

Recent Articles

Exploit kits attack vector – mid-year update
Securelist • Vicente Diaz • 01 Aug 2011

It is very interesting to see how short the lifespan of an exploit kit is. Some kits that were once popular and infected thousands of users are no longer being used. Even more interesting is the fact that some old kits make a comeback rearmed with fresh new exploits and reach the top of the rankings in serving malware. However, the most interesting area of study is how current exploits are used and their targets. In order to get some perspective, let?s start by analyzing the situation in 2010. T...