mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 18:52:12 +00:00
19 lines
1023 B
Markdown
19 lines
1023 B
Markdown
![]() |
### [CVE-2006-3281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3281)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Microsoft Internet Explorer 6.0 does not properly handle Drag and Drop events, which allows remote user-assisted attackers to execute arbitrary code via a link to an SMB file share with a filename that contains encoded ..\ (%2e%2e%5c) sequences and whose extension contains the CLSID Key identifier for HTML Applications (HTA), aka "Folder GUID Code Execution Vulnerability." NOTE: directory traversal sequences were used in the original exploit, although their role is not clear.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://www.kb.cert.org/vuls/id/655100
|
||
|
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-045
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|