Maxthon 1.2.0 and 1.2.1 allows remote attackers to bypass the security ID and use restricted plugin API functions via script that includes the max.src file into the source page.
References
| Link | Resource |
|---|---|
| http://www.raffon.net/advisories/maxthon/multvulns.html | Exploit Patch Vendor Advisory |
| http://www.securityfocus.com/bid/13073 | Exploit |
| http://www.osvdb.org/15424 | |
| http://secunia.com/advisories/14918 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-05-01 21:00
Updated : 2008-09-05 13:48
NVD link : CVE-2005-1091
Mitre link : CVE-2005-1091
JSON object : View
CWE
Products Affected
maxthon
- maxthon


