Vulnerability Description
Directory traversal vulnerability in the readFile and writeFile API for Maxthon 1.2.0 and 1.2.1 allows remote attackers to read or write arbitrary files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Maxthon | Maxthon | 1.2.0 |
References
- http://secunia.com/advisories/14918PatchVendor Advisory
- http://www.osvdb.org/15423
- http://www.raffon.net/advisories/maxthon/multvulns.htmlExploitVendor Advisory
- http://www.securityfocus.com/bid/13074Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20033
- http://secunia.com/advisories/14918PatchVendor Advisory
- http://www.osvdb.org/15423
- http://www.raffon.net/advisories/maxthon/multvulns.htmlExploitVendor Advisory
- http://www.securityfocus.com/bid/13074Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20033
FAQ
What is CVE-2005-1090?
CVE-2005-1090 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Directory traversal vulnerability in the readFile and writeFile API for Maxthon 1.2.0 and 1.2.1 allows remote attackers to read or write arbitrary files.
How severe is CVE-2005-1090?
CVE-2005-1090 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1090?
Check the references section above for vendor advisories and patch information. Affected products include: Maxthon Maxthon.