Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2003-0115 | First vendor Publication | 2003-05-12 |
Vendor | Cve | Last vendor Modification | 2021-07-23 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Internet Explorer 5.01, 5.5 and 6.0 does not properly check parameters that are passed during third party rendering, which could allow remote attackers to execute arbitrary web script, aka the "Third Party Plugin Rendering" vulnerability, a different vulnerability than CVE-2003-0233. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0115 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2005-11-03 | Name : IE 5.01 5.5 6.0 Cumulative patch (890923) File : nvt/smb_nt_ms02-005.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
2973 | Microsoft IE Third Party Plugin Rendering XSS Microsoft Internet Explorer contains a flaw in the 'plugin.ocx' file. This issue is triggered when it renders third party file types (such as .swf). The "EnableFullPage" parameter does not have sufficient sanity checking performed which allows an attacker to inject arbitrary script code. This can be exploited when a vulnerable browser loads a web document. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Internet Explorer Third-Party Plugin ActiveX object access RuleID : 4189 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer Content-Encoding overflow attempt RuleID : 3462-community - Revision : 14 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer Content-Encoding overflow attempt RuleID : 3462 - Revision : 14 - Type : BROWSER-IE |
2014-01-10 | Content-Type overflow attempt RuleID : 3461-community - Revision : 18 - Type : SERVER-MAIL |
2014-01-10 | Content-Type overflow attempt RuleID : 3461 - Revision : 18 - Type : SERVER-MAIL |
Sources (Detail)
Source | Url |
---|---|
MS | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03... |
XF | http://www.iss.net/security_center/static/11848.php |
Alert History
Date | Informations |
---|---|
2021-07-27 00:24:37 |
|
2021-07-24 01:44:15 |
|
2021-07-24 01:01:30 |
|
2021-07-23 17:24:42 |
|
2021-07-23 01:44:03 |
|
2021-07-23 01:01:29 |
|
2021-07-22 21:24:59 |
|
2021-05-04 12:02:01 |
|
2021-04-22 01:02:07 |
|
2020-05-23 00:15:21 |
|
2018-10-13 00:22:26 |
|
2013-05-11 11:50:35 |
|