Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Microsoft Internet Explorer Web Script Execution Vulnerabilities

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

This host has Internet Explorer installed and is prone to Web Script Execution vulnerabilities.

Insight

Insight

- Error exists while the HTTP Host header to determine the context of a document provided in a '4xx' or '5xx' CONNECT response from a proxy server, and these can be exploited by modifying the CONNECT response, aka an 'SSL tampering' attack. - Displays a cached certificate for a '4xx' or '5xx' CONNECT response page returned by a proxy server, which can be exploited by sending the browser a crafted 502 response page upon a subsequent request.

Affected Software

Affected Software

Microsoft Internet Explorer version prior to 8.0 on Windows.

Solution

Solution

Upgrade to latest version.

Common Vulnerabilities and Exposures (CVE)