CVE-2003-1326 Details

CVE-2003-1326

Published: 2003-02-19
Last Modified: 2018-10-12
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Microsoft Internet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model to run malicious script or arbitrary programs via dialog boxes, aka "Improper Cross Domain Security Validation with dialog box."

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 7.5/10
Exploit Score 10/10
Access Vector Network
Access Complexity Low
Authentication None
Impact Score 6.4/10
Confidentiality Impact Partial
Availability Impact Partial
Integrity Impact Partial
Vector String AV:N/AC:L/Au:N/C:P/I:P/A:P
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:microsoft:ie:5.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:microsoft:ie:5.0.1:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:microsoft:ie:5.0.1:sp2:*:*:*:*:*:* Yes - -
cpe:2.3:a:microsoft:ie:5.0.1:sp3:*:*:*:*:*:* Yes - -
cpe:2.3:a:microsoft:ie:5.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:microsoft:ie:5.5:sp1:*:*:*:*:*:* Yes - -
cpe:2.3:a:microsoft:ie:5.5:sp2:*:*:*:*:*:* Yes - -
cpe:2.3:a:microsoft:ie:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:* Yes - -
References

http://www.ciac.org/ciac/bulletins/n-038.shtml
http://www.iss.net/security_center/static/11258.php
http://www.securityfocus.com/bid/6779
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-004
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A126
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A178
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A49

CVE ID
CVE-2003-1326
Published
2003-02-19
Modified
2018-10-12
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.