90 lines
3.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-4560",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-06T00:04:00.000",
"lastModified": "2018-10-17T21:37:38.103",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Internet Explorer 6 on Windows XP SP2 allows remote attackers to execute arbitrary JavaScript in the context of the browser's session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and that has a domain name under the attacker's control, which can force the browser to drop DNS pinning and perform a new DNS query for the domain name after the script is already running."
},
{
"lang": "es",
"value": "Internet Explorer 6 sobre Windows XP SP2 permite a un atacante remoto ejecutar c\u00f3digo JavaScript de su elecci\u00f3n en el contexto de una sesi\u00f3n del navegador con un servidor web intranet de su elecci\u00f3n, a trav\u00e9s de una secuencia de comandos de alojamiento de una web sobre un servidor web de Internet puede el atacante puede hacerlo inaccesibley tener un dominio bajo el control del atacante, lo cual puede forzar al navegador disminuir DNS que fija y realizar una nueva pregunta al DNS para el nombre de dominio despu\u00e9s de que la secuencia de comandos est\u00e9 ya funcionando."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:*",
"matchCriteriaId": "B80088A3-2AA4-44A2-98DF-359E15F8E18B"
}
]
}
]
}
],
"references": [
{
"url": "http://polyboy.net/xss/dnsslurp.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://shampoo.antville.org/stories/1451301/",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/443209/100/200/threaded",
"source": "cve@mitre.org"
}
]
}