HIGH · 7.5

CVE-2005-1091

Maxthon 1.2.0 and 1.2.1 allows remote attackers to bypass the security ID and use restricted plugin API functions via script that includes the max.src file into the source page.

Vulnerability Description

Maxthon 1.2.0 and 1.2.1 allows remote attackers to bypass the security ID and use restricted plugin API functions via script that includes the max.src file into the source page.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
MaxthonMaxthon1.2

References

FAQ

What is CVE-2005-1091?

CVE-2005-1091 is a vulnerability with a CVSS score of 7.5 (HIGH). Maxthon 1.2.0 and 1.2.1 allows remote attackers to bypass the security ID and use restricted plugin API functions via script that includes the max.src file into the source page.

How severe is CVE-2005-1091?

CVE-2005-1091 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2005-1091?

Check the references section above for vendor advisories and patch information. Affected products include: Maxthon Maxthon.